| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899 |
- //go:build with_quic
- package httpclient
- import (
- "testing"
- "time"
- )
- func TestHTTP3BrokenAuthorityIsolation(t *testing.T) {
- transport := &http3FallbackTransport{broken: make(map[string]http3BrokenEntry)}
- transport.markH3Broken("a.example:443")
- if !transport.h3Broken("a.example:443") {
- t.Fatal("a.example:443 should be broken after mark")
- }
- if transport.h3Broken("b.example:443") {
- t.Fatal("b.example:443 must not be affected by marking a.example")
- }
- }
- func TestHTTP3BrokenBackoffPerAuthority(t *testing.T) {
- transport := &http3FallbackTransport{broken: make(map[string]http3BrokenEntry)}
- transport.markH3Broken("a.example:443")
- if transport.broken["a.example:443"].backoff != 5*time.Minute {
- t.Fatalf("first mark should set backoff to 5m, got %v", transport.broken["a.example:443"].backoff)
- }
- transport.markH3Broken("a.example:443")
- if transport.broken["a.example:443"].backoff != 10*time.Minute {
- t.Fatalf("second mark should double backoff to 10m, got %v", transport.broken["a.example:443"].backoff)
- }
- transport.markH3Broken("a.example:443")
- if transport.broken["a.example:443"].backoff != 20*time.Minute {
- t.Fatalf("third mark should double to 20m, got %v", transport.broken["a.example:443"].backoff)
- }
- if _, found := transport.broken["b.example:443"]; found {
- t.Fatal("marking a.example must not leak into b.example backoff state")
- }
- transport.markH3Broken("b.example:443")
- if transport.broken["b.example:443"].backoff != 5*time.Minute {
- t.Fatalf("b.example first mark should start at 5m independent of a.example, got %v", transport.broken["b.example:443"].backoff)
- }
- }
- func TestHTTP3BrokenBackoffCap(t *testing.T) {
- transport := &http3FallbackTransport{broken: make(map[string]http3BrokenEntry)}
- transport.broken["a.example:443"] = http3BrokenEntry{backoff: 48 * time.Hour, until: time.Now().Add(48 * time.Hour)}
- transport.markH3Broken("a.example:443")
- if transport.broken["a.example:443"].backoff != 48*time.Hour {
- t.Fatalf("backoff must cap at 48h, got %v", transport.broken["a.example:443"].backoff)
- }
- }
- func TestHTTP3BrokenClearDeletesEntry(t *testing.T) {
- transport := &http3FallbackTransport{broken: make(map[string]http3BrokenEntry)}
- transport.markH3Broken("a.example:443")
- transport.markH3Broken("b.example:443")
- transport.clearH3Broken("a.example:443")
- if _, found := transport.broken["a.example:443"]; found {
- t.Fatal("clearH3Broken must delete the entry")
- }
- if !transport.h3Broken("b.example:443") {
- t.Fatal("clearing a.example must not affect b.example")
- }
- }
- func TestHTTP3BrokenExpiredEntryGarbageCollected(t *testing.T) {
- transport := &http3FallbackTransport{broken: make(map[string]http3BrokenEntry)}
- transport.broken["a.example:443"] = http3BrokenEntry{
- backoff: 5 * time.Minute,
- until: time.Now().Add(-time.Second),
- }
- if transport.h3Broken("a.example:443") {
- t.Fatal("expired entry must report not broken")
- }
- if _, found := transport.broken["a.example:443"]; found {
- t.Fatal("expired entry must be garbage-collected on read")
- }
- }
- func TestHTTP3BrokenEmptyAuthorityNoOp(t *testing.T) {
- transport := &http3FallbackTransport{broken: make(map[string]http3BrokenEntry)}
- transport.markH3Broken("")
- if len(transport.broken) != 0 {
- t.Fatalf("markH3Broken must ignore empty authority, got %d entries", len(transport.broken))
- }
- if transport.h3Broken("") {
- t.Fatal("h3Broken must return false for empty authority")
- }
- transport.clearH3Broken("")
- }
|