| Index: net/http/http_network_transaction_unittest.cc
|
| diff --git a/net/http/http_network_transaction_unittest.cc b/net/http/http_network_transaction_unittest.cc
|
| index 571454394625fe114da6e8d7a9e8133898ca0970..ea087d0c918e31fbbbba420da415be3f41f18b65 100644
|
| --- a/net/http/http_network_transaction_unittest.cc
|
| +++ b/net/http/http_network_transaction_unittest.cc
|
| @@ -6373,4 +6373,146 @@ TEST_F(HttpNetworkTransactionTest, SpdyPostNPNServerHangup) {
|
| HttpNetworkTransaction::SetUseAlternateProtocols(false);
|
| }
|
|
|
| +TEST_F(HttpNetworkTransactionTest, SpdyAlternateProtocolThroughProxy) {
|
| + // This test ensures that the URL passed into the proxy is upgraded
|
| + // to https when doing an Alternate Protocol upgrade.
|
| + HttpNetworkTransaction::SetUseAlternateProtocols(true);
|
| + HttpNetworkTransaction::SetNextProtos(
|
| + "\x08http/1.1\x07http1.1\x06spdy/2\x04spdy");
|
| +
|
| + SessionDependencies session_deps(CreateFixedProxyService("myproxy:70"));
|
| + HttpAuthHandlerMock::Factory* auth_factory =
|
| + new HttpAuthHandlerMock::Factory();
|
| + HttpAuthHandlerMock* auth_handler = new HttpAuthHandlerMock();
|
| + auth_factory->set_mock_handler(auth_handler, HttpAuth::AUTH_PROXY);
|
| + auth_factory->set_do_init_from_challenge(true);
|
| + session_deps.http_auth_handler_factory.reset(auth_factory);
|
| +
|
| + HttpRequestInfo request;
|
| + request.method = "GET";
|
| + request.url = GURL("http://www.google.com");
|
| + request.load_flags = 0;
|
| +
|
| + // First round goes unauthenticated through the proxy.
|
| + MockWrite data_writes_1[] = {
|
| + MockWrite("GET http://www.google.com/ HTTP/1.1\r\n"
|
| + "Host: www.google.com\r\n"
|
| + "Proxy-Connection: keep-alive\r\n"
|
| + "\r\n"),
|
| + };
|
| + MockRead data_reads_1[] = {
|
| + MockRead(false, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ),
|
| + MockRead("HTTP/1.1 200 OK\r\n"
|
| + "Alternate-Protocol: 443:npn-spdy/2\r\n"
|
| + "Proxy-Connection: close\r\n"
|
| + "\r\n"),
|
| + };
|
| + StaticSocketDataProvider data_1(data_reads_1, arraysize(data_reads_1),
|
| + data_writes_1, arraysize(data_writes_1));
|
| +
|
| + // Second round tries to tunnel to www.google.com due to the
|
| + // Alternate-Protocol announcement in the first round. It fails due
|
| + // to a proxy authentication challenge.
|
| + // After the failure, a tunnel is established to www.google.com using
|
| + // Proxy-Authorization headers. There is then a SPDY request round.
|
| + //
|
| + // NOTE: Despite the "Proxy-Connection: Close", these are done on the
|
| + // same MockTCPClientSocket since the underlying HttpNetworkClientSocket
|
| + // does a Disconnect and Connect on the same socket, rather than trying
|
| + // to obtain a new one.
|
| + //
|
| + // NOTE: Originally, the proxy response to the second CONNECT request
|
| + // simply returned another 407 so the unit test could skip the SSL connection
|
| + // establishment and SPDY framing issues. Alas, the
|
| + // retry-http-when-alternate-protocol fails logic kicks in, which was more
|
| + // complicated to set up expectations for than the SPDY session.
|
| +
|
| + scoped_ptr<spdy::SpdyFrame> req(ConstructSpdyGet(NULL, 0, false, 1, LOWEST));
|
| + scoped_ptr<spdy::SpdyFrame> resp(ConstructSpdyGetSynReply(NULL, 0, 1));
|
| + scoped_ptr<spdy::SpdyFrame> data(ConstructSpdyBodyFrame(1, true));
|
| +
|
| + MockWrite data_writes_2[] = {
|
| + // First connection attempt without Proxy-Authorization.
|
| + MockWrite("CONNECT www.google.com:443 HTTP/1.1\r\n"
|
| + "Host: www.google.com\r\n"
|
| + "Proxy-Connection: keep-alive\r\n"
|
| + "\r\n"),
|
| +
|
| + // Second connection attempt with Proxy-Authorization.
|
| + MockWrite("CONNECT www.google.com:443 HTTP/1.1\r\n"
|
| + "Host: www.google.com\r\n"
|
| + "Proxy-Connection: keep-alive\r\n"
|
| + "Proxy-Authorization: auth_token\r\n"
|
| + "\r\n"),
|
| +
|
| + // SPDY request
|
| + CreateMockWrite(*req),
|
| + };
|
| + const char kRejectConnectResponse[] = ("HTTP/1.1 407 Unauthorized\r\n"
|
| + "Proxy-Authenticate: Mock\r\n"
|
| + "Proxy-Connection: close\r\n"
|
| + "\r\n");
|
| + const char kAcceptConnectResponse[] = "HTTP/1.1 200 Connected\r\n\r\n";
|
| + MockRead data_reads_2[] = {
|
| + // First connection attempt fails
|
| + MockRead(false, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ, 1),
|
| + MockRead(true, kRejectConnectResponse,
|
| + arraysize(kRejectConnectResponse) - 1, 1),
|
| +
|
| + // Second connection attempt passes
|
| + MockRead(true, kAcceptConnectResponse,
|
| + arraysize(kAcceptConnectResponse) -1, 4),
|
| +
|
| + // SPDY response
|
| + CreateMockRead(*resp.get(), 6),
|
| + CreateMockRead(*data.get(), 6),
|
| + MockRead(true, 0, 0, 6),
|
| + };
|
| + scoped_refptr<OrderedSocketData> data_2(
|
| + new OrderedSocketData(data_reads_2, arraysize(data_reads_2),
|
| + data_writes_2, arraysize(data_writes_2)));
|
| +
|
| + SSLSocketDataProvider ssl(true, OK);
|
| + ssl.next_proto_status = SSLClientSocket::kNextProtoNegotiated;
|
| + ssl.next_proto = "spdy/2";
|
| + ssl.was_npn_negotiated = true;
|
| +
|
| + session_deps.socket_factory.AddSocketDataProvider(&data_1);
|
| + session_deps.socket_factory.AddSocketDataProvider(data_2.get());
|
| + session_deps.socket_factory.AddSSLSocketDataProvider(&ssl);
|
| + scoped_refptr<HttpNetworkSession> session(CreateSession(&session_deps));
|
| +
|
| + // First round should work and provide the Alternate-Protocol state.
|
| + TestCompletionCallback callback_1;
|
| + scoped_ptr<HttpTransaction> trans_1(new HttpNetworkTransaction(session));
|
| + int rv = trans_1->Start(&request, &callback_1, BoundNetLog());
|
| + EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_EQ(OK, callback_1.WaitForResult());
|
| +
|
| + // Second round should attempt a tunnel connect and get an auth challenge.
|
| + TestCompletionCallback callback_2;
|
| + scoped_ptr<HttpTransaction> trans_2(new HttpNetworkTransaction(session));
|
| + rv = trans_2->Start(&request, &callback_2, BoundNetLog());
|
| + EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_EQ(OK, callback_2.WaitForResult());
|
| + const HttpResponseInfo* response = trans_2->GetResponseInfo();
|
| + ASSERT_FALSE(response == NULL);
|
| + ASSERT_FALSE(response->auth_challenge.get() == NULL);
|
| +
|
| + // Restart with auth. Tunnel should work and response received.
|
| + TestCompletionCallback callback_3;
|
| + rv = trans_2->RestartWithAuth(kFoo, kBar, &callback_3);
|
| + EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_EQ(OK, callback_3.WaitForResult());
|
| +
|
| + // After all that work, these two lines (or actually, just the scheme) are
|
| + // what this test is all about. Make sure it happens correctly.
|
| + const GURL& request_url = auth_handler->request_url();
|
| + EXPECT_EQ("https", request_url.scheme());
|
| + EXPECT_EQ("www.google.com", request_url.host());
|
| +
|
| + HttpNetworkTransaction::SetNextProtos("");
|
| + HttpNetworkTransaction::SetUseAlternateProtocols(false);
|
| +}
|
| +
|
| } // namespace net
|
|
|