Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(808)

Unified Diff: net/http/http_auth_handler_negotiate_unittest.cc

Issue 2883031: Kerberos authentication backoff cleanup. (Closed)
Patch Set: Refactored the unit tests. Created 10 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/http/http_auth_controller.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/http/http_auth_handler_negotiate_unittest.cc
diff --git a/net/http/http_auth_handler_negotiate_unittest.cc b/net/http/http_auth_handler_negotiate_unittest.cc
index a95eb44e12cce732456e782bd3e8cf528f6a4237..4fcdad16a706053477f13ab669b9d98f20c40d57 100644
--- a/net/http/http_auth_handler_negotiate_unittest.cc
+++ b/net/http/http_auth_handler_negotiate_unittest.cc
@@ -12,6 +12,7 @@
#include "net/http/mock_sspi_library_win.h"
#elif defined(OS_POSIX)
#include "net/http/mock_gssapi_library_posix.h"
+#include "net/third_party/gssapi/gssapi.h"
#endif
#include "testing/gtest/include/gtest/gtest.h"
#include "testing/platform_test.h"
@@ -29,7 +30,6 @@ class HttpAuthHandlerNegotiateTest : public PlatformTest {
public:
virtual void SetUp() {
auth_library_.reset(new MockAuthLibrary());
- SetupMocks(auth_library_.get());
resolver_ = new MockHostResolver();
resolver_->rules()->AddIPLiteralRule("alias", "10.0.0.2",
"canonical.example.com");
@@ -132,8 +132,7 @@ class HttpAuthHandlerNegotiateTest : public PlatformTest {
},
};
- size_t i;
- for (i = 0; i < arraysize(queries); ++i) {
+ for (size_t i = 0; i < arraysize(queries); ++i) {
mock_library->ExpectSecurityContext(queries[i].expected_package,
queries[i].response_code,
queries[i].minor_response_code,
@@ -144,6 +143,38 @@ class HttpAuthHandlerNegotiateTest : public PlatformTest {
#endif // defined(OS_POSIX)
}
+#if defined(OS_POSIX)
+ void SetupErrorMocks(MockAuthLibrary* mock_library,
+ int major_status,
+ int minor_status) {
+ const gss_OID_desc kDefaultMech = { 0, NULL };
+ test::GssContextMockImpl context(
+ "localhost", // Source name
+ "example.com", // Target name
+ 0, // Lifetime
+ kDefaultMech, // Mechanism
+ 0, // Context flags
+ 1, // Locally initiated
+ 0); // Open
+ test::MockGSSAPILibrary::SecurityContextQuery query = {
+ "Negotiate", // Package name
+ major_status, // Major response code
+ minor_status, // Minor response code
+ context, // Context
+ { 0, NULL }, // Expected input token
+ { 0, NULL } // Output token
+ };
+
+ mock_library->ExpectSecurityContext(query.expected_package,
+ query.response_code,
+ query.minor_response_code,
+ query.context_info,
+ query.expected_input_token,
+ query.output_token);
+ }
+
+#endif // defined(OS_POSIX)
+
int CreateHandler(bool disable_cname_lookup, bool use_port,
bool synchronous_resolve_mode,
const std::string& url_string,
@@ -172,6 +203,8 @@ class HttpAuthHandlerNegotiateTest : public PlatformTest {
return rv;
}
+ MockAuthLibrary* AuthLibrary() { return auth_library_.get(); }
+
private:
#if defined(OS_WIN)
scoped_ptr<SecPkgInfoW> security_package_;
@@ -183,6 +216,7 @@ class HttpAuthHandlerNegotiateTest : public PlatformTest {
};
TEST_F(HttpAuthHandlerNegotiateTest, DisableCname) {
+ SetupMocks(AuthLibrary());
scoped_ptr<HttpAuthHandlerNegotiate> auth_handler;
EXPECT_EQ(OK, CreateHandler(
true, false, true, "http://alias:500", &auth_handler));
@@ -204,6 +238,7 @@ TEST_F(HttpAuthHandlerNegotiateTest, DisableCname) {
}
TEST_F(HttpAuthHandlerNegotiateTest, DisableCnameStandardPort) {
+ SetupMocks(AuthLibrary());
scoped_ptr<HttpAuthHandlerNegotiate> auth_handler;
EXPECT_EQ(OK, CreateHandler(
true, true, true, "http://alias:80", &auth_handler));
@@ -224,6 +259,7 @@ TEST_F(HttpAuthHandlerNegotiateTest, DisableCnameStandardPort) {
}
TEST_F(HttpAuthHandlerNegotiateTest, DisableCnameNonstandardPort) {
+ SetupMocks(AuthLibrary());
scoped_ptr<HttpAuthHandlerNegotiate> auth_handler;
EXPECT_EQ(OK, CreateHandler(
true, true, true, "http://alias:500", &auth_handler));
@@ -244,6 +280,7 @@ TEST_F(HttpAuthHandlerNegotiateTest, DisableCnameNonstandardPort) {
}
TEST_F(HttpAuthHandlerNegotiateTest, CnameSync) {
+ SetupMocks(AuthLibrary());
scoped_ptr<HttpAuthHandlerNegotiate> auth_handler;
EXPECT_EQ(OK, CreateHandler(
false, false, true, "http://alias:500", &auth_handler));
@@ -264,6 +301,7 @@ TEST_F(HttpAuthHandlerNegotiateTest, CnameSync) {
}
TEST_F(HttpAuthHandlerNegotiateTest, CnameAsync) {
+ SetupMocks(AuthLibrary());
scoped_ptr<HttpAuthHandlerNegotiate> auth_handler;
EXPECT_EQ(OK, CreateHandler(
false, false, false, "http://alias:500", &auth_handler));
@@ -283,4 +321,39 @@ TEST_F(HttpAuthHandlerNegotiateTest, CnameAsync) {
#endif
}
+#if defined(OS_POSIX)
+
+// These tests are only for GSSAPI, as we can't use explicit credentials with
+// that library.
+
+TEST_F(HttpAuthHandlerNegotiateTest, ServerNotInKerberosDatabase) {
+ SetupErrorMocks(AuthLibrary(), GSS_S_FAILURE, 0x96C73A07); // No server
+ scoped_ptr<HttpAuthHandlerNegotiate> auth_handler;
+ EXPECT_EQ(OK, CreateHandler(
+ false, false, false, "http://alias:500", &auth_handler));
+ ASSERT_TRUE(auth_handler.get() != NULL);
+ TestCompletionCallback callback;
+ HttpRequestInfo request_info;
+ std::string token;
+ EXPECT_EQ(ERR_IO_PENDING, auth_handler->GenerateAuthToken(
+ NULL, NULL, &request_info, &callback, &token));
+ EXPECT_EQ(ERR_MISSING_AUTH_CREDENTIALS, callback.WaitForResult());
+}
+
+TEST_F(HttpAuthHandlerNegotiateTest, NoKerberosCredentials) {
+ SetupErrorMocks(AuthLibrary(), GSS_S_FAILURE, 0x96C73AC3); // No credentials
+ scoped_ptr<HttpAuthHandlerNegotiate> auth_handler;
+ EXPECT_EQ(OK, CreateHandler(
+ false, false, false, "http://alias:500", &auth_handler));
+ ASSERT_TRUE(auth_handler.get() != NULL);
+ TestCompletionCallback callback;
+ HttpRequestInfo request_info;
+ std::string token;
+ EXPECT_EQ(ERR_IO_PENDING, auth_handler->GenerateAuthToken(
+ NULL, NULL, &request_info, &callback, &token));
+ EXPECT_EQ(ERR_MISSING_AUTH_CREDENTIALS, callback.WaitForResult());
+}
+
+#endif // defined(OS_POSIX)
+
} // namespace net
« no previous file with comments | « net/http/http_auth_controller.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698