Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1041)

Unified Diff: net/proxy/init_proxy_resolver_unittest.cc

Issue 6831025: Adds support for the DHCP portion of the WPAD (proxy auto-discovery) protocol. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Add timeout on Win32 DHCP API. Created 9 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/proxy/init_proxy_resolver_unittest.cc
diff --git a/net/proxy/init_proxy_resolver_unittest.cc b/net/proxy/init_proxy_resolver_unittest.cc
index b0d416d33777f482e3e18b86e2570d7bd41da3e7..c8944d11ee67305abb02c6c34a254653dd4da75b 100644
--- a/net/proxy/init_proxy_resolver_unittest.cc
+++ b/net/proxy/init_proxy_resolver_unittest.cc
@@ -11,6 +11,7 @@
#include "net/base/net_log_unittest.h"
#include "net/base/test_completion_callback.h"
#include "net/proxy/init_proxy_resolver.h"
+#include "net/proxy/dhcp_proxy_script_fetcher.h"
#include "net/proxy/proxy_config.h"
#include "net/proxy/proxy_resolver.h"
#include "net/proxy/proxy_script_fetcher.h"
@@ -89,15 +90,14 @@ class Rules {
RuleList rules_;
};
-class RuleBasedProxyScriptFetcher : public ProxyScriptFetcher {
+class RuleBasedProxyScriptFetcher : public URLProxyScriptFetcher {
public:
explicit RuleBasedProxyScriptFetcher(const Rules* rules) : rules_(rules) {}
// ProxyScriptFetcher implementation.
- virtual int Fetch(const GURL& url,
- string16* text,
+ virtual int Fetch(string16* text,
CompletionCallback* callback) {
- const Rules::Rule& rule = rules_->GetRuleByUrl(url);
+ const Rules::Rule& rule = rules_->GetRuleByUrl(url_);
int rv = rule.fetch_error;
EXPECT_NE(ERR_UNEXPECTED, rv);
if (rv == OK)
@@ -107,10 +107,15 @@ class RuleBasedProxyScriptFetcher : public ProxyScriptFetcher {
virtual void Cancel() {}
- virtual URLRequestContext* GetRequestContext() { return NULL; }
+ virtual URLRequestContext* GetRequestContext() const { return NULL; }
+
+ virtual void SetURL(const GURL& url) {
+ url_ = url;
+ }
private:
const Rules* rules_;
+ GURL url_;
};
class RuleBasedProxyResolver : public ProxyResolver {
@@ -182,8 +187,10 @@ TEST(InitProxyResolverTest, CustomPacSucceeds) {
TestCompletionCallback callback;
CapturingNetLog log(CapturingNetLog::kUnbounded);
+ ProxyConfig effective_config;
InitProxyResolver init(&resolver, &fetcher, &log);
- EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback));
+ EXPECT_EQ(OK, init.Init(
+ config, base::TimeDelta(), &effective_config, &callback));
EXPECT_EQ(rule.text(), resolver.script_data()->utf16());
// Check the NetLog was filled correctly.
@@ -203,6 +210,9 @@ TEST(InitProxyResolverTest, CustomPacSucceeds) {
entries, 4, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEndEvent(
entries, 5, NetLog::TYPE_INIT_PROXY_RESOLVER));
+
+ EXPECT_TRUE(effective_config.has_pac_url());
+ EXPECT_EQ(config.pac_url(), effective_config.pac_url());
}
// Fail downloading the custom PAC script.
@@ -218,9 +228,10 @@ TEST(InitProxyResolverTest, CustomPacFails1) {
TestCompletionCallback callback;
CapturingNetLog log(CapturingNetLog::kUnbounded);
+ ProxyConfig effective_config;
InitProxyResolver init(&resolver, &fetcher, &log);
EXPECT_EQ(kFailedDownloading,
- init.Init(config, base::TimeDelta(), NULL, &callback));
+ init.Init(config, base::TimeDelta(), &effective_config, &callback));
EXPECT_EQ(NULL, resolver.script_data());
// Check the NetLog was filled correctly.
@@ -236,6 +247,8 @@ TEST(InitProxyResolverTest, CustomPacFails1) {
entries, 2, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEndEvent(
entries, 3, NetLog::TYPE_INIT_PROXY_RESOLVER));
+
+ EXPECT_FALSE(effective_config.has_pac_url());
}
// Fail parsing the custom PAC script.
@@ -271,7 +284,21 @@ TEST(InitProxyResolverTest, HasNullProxyScriptFetcher) {
EXPECT_EQ(NULL, resolver.script_data());
}
-// Succeeds in choosing autodetect (wpad).
+class NoDhcpInitProxyResolver : public InitProxyResolver {
+ public:
+ NoDhcpInitProxyResolver(ProxyResolver* resolver,
+ URLProxyScriptFetcher* proxy_script_fetcher,
+ NetLog* net_log)
+ : InitProxyResolver(resolver, proxy_script_fetcher, net_log) {
+ }
+
+ DhcpProxyScriptFetcher* ImplCreateDhcpProxyScriptFetcher(
+ URLRequestContext* url_request_context) OVERRIDE {
+ return new DoNothingDhcpProxyScriptFetcher();
+ }
+};
+
+// Succeeds in choosing autodetect (WPAD DNS).
TEST(InitProxyResolverTest, AutodetectSuccess) {
Rules rules;
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/);
@@ -283,9 +310,14 @@ TEST(InitProxyResolverTest, AutodetectSuccess) {
Rules::Rule rule = rules.AddSuccessRule("http://wpad/wpad.dat");
TestCompletionCallback callback;
- InitProxyResolver init(&resolver, &fetcher, NULL);
- EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback));
+ ProxyConfig effective_config;
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, NULL);
+ EXPECT_EQ(OK, init.Init(
+ config, base::TimeDelta(), &effective_config, &callback));
EXPECT_EQ(rule.text(), resolver.script_data()->utf16());
+
+ EXPECT_TRUE(effective_config.has_pac_url());
+ EXPECT_EQ(rule.url, effective_config.pac_url());
}
// Fails at WPAD (downloading), but succeeds in choosing the custom PAC.
@@ -302,12 +334,18 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess1) {
Rules::Rule rule = rules.AddSuccessRule("http://custom/proxy.pac");
TestCompletionCallback callback;
- InitProxyResolver init(&resolver, &fetcher, NULL);
- EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback));
+ ProxyConfig effective_config;
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, NULL);
+ EXPECT_EQ(OK, init.Init(
+ config, base::TimeDelta(), &effective_config, &callback));
EXPECT_EQ(rule.text(), resolver.script_data()->utf16());
+
+ EXPECT_TRUE(effective_config.has_pac_url());
+ EXPECT_EQ(rule.url, effective_config.pac_url());
}
-// Fails at WPAD (parsing), but succeeds in choosing the custom PAC.
+// Fails at WPAD (no DHCP config, DNS PAC fails parsing), but succeeds in
+// choosing the custom PAC.
TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2) {
Rules rules;
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/);
@@ -325,7 +363,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2) {
CapturingNetLog log(CapturingNetLog::kUnbounded);
ProxyConfig effective_config;
- InitProxyResolver init(&resolver, &fetcher, &log);
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, &log);
EXPECT_EQ(OK, init.Init(config, base::TimeDelta(),
&effective_config, &callback));
EXPECT_EQ(rule.text(), resolver.script_data()->utf16());
@@ -336,36 +374,48 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2) {
ProxyConfig::CreateFromCustomPacURL(GURL("http://custom/proxy.pac"))));
// Check the NetLog was filled correctly.
- // (Note that the Fetch and Set states are repeated since both WPAD and custom
+ // (Note that various states are repeated since both WPAD and custom
// PAC scripts are tried).
CapturingNetLog::EntryList entries;
log.GetEntries(&entries);
- EXPECT_EQ(11u, entries.size());
+ EXPECT_EQ(14u, entries.size());
EXPECT_TRUE(LogContainsBeginEvent(
entries, 0, NetLog::TYPE_INIT_PROXY_RESOLVER));
+ // This is the DHCP phase, which fails fetching rather than parsing, so
+ // there is no pair of SET_PAC_SCRIPT events.
EXPECT_TRUE(LogContainsBeginEvent(
entries, 1, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEndEvent(
entries, 2, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
+ EXPECT_TRUE(LogContainsEvent(
+ entries, 3,
+ NetLog::TYPE_INIT_PROXY_RESOLVER_FALLING_BACK_TO_NEXT_PAC_SOURCE,
+ NetLog::PHASE_NONE));
+ // This is the DNS phase, which attempts a fetch but fails.
EXPECT_TRUE(LogContainsBeginEvent(
- entries, 3, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
+ entries, 4, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEndEvent(
- entries, 4, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
+ entries, 5, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
+ EXPECT_TRUE(LogContainsBeginEvent(
+ entries, 6, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
+ EXPECT_TRUE(LogContainsEndEvent(
+ entries, 7, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEvent(
- entries, 5,
- NetLog::TYPE_INIT_PROXY_RESOLVER_FALLING_BACK_TO_NEXT_PAC_URL,
+ entries, 8,
+ NetLog::TYPE_INIT_PROXY_RESOLVER_FALLING_BACK_TO_NEXT_PAC_SOURCE,
NetLog::PHASE_NONE));
+ // Finally, the custom PAC URL phase.
EXPECT_TRUE(LogContainsBeginEvent(
- entries, 6, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
+ entries, 9, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEndEvent(
- entries, 7, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
+ entries, 10, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT));
EXPECT_TRUE(LogContainsBeginEvent(
- entries, 8, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
+ entries, 11, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEndEvent(
- entries, 9, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
+ entries, 12, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT));
EXPECT_TRUE(LogContainsEndEvent(
- entries, 10, NetLog::TYPE_INIT_PROXY_RESOLVER));
+ entries, 13, NetLog::TYPE_INIT_PROXY_RESOLVER));
}
// Fails at WPAD (downloading), and fails at custom PAC (downloading).
@@ -382,7 +432,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomFails1) {
rules.AddFailDownloadRule("http://custom/proxy.pac");
TestCompletionCallback callback;
- InitProxyResolver init(&resolver, &fetcher, NULL);
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, NULL);
EXPECT_EQ(kFailedDownloading,
init.Init(config, base::TimeDelta(), NULL, &callback));
EXPECT_EQ(NULL, resolver.script_data());
@@ -402,7 +452,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomFails2) {
rules.AddFailParsingRule("http://custom/proxy.pac");
TestCompletionCallback callback;
- InitProxyResolver init(&resolver, &fetcher, NULL);
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, NULL);
EXPECT_EQ(kFailedParsing,
init.Init(config, base::TimeDelta(), NULL, &callback));
EXPECT_EQ(NULL, resolver.script_data());
@@ -424,7 +474,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2_NoFetch) {
Rules::Rule rule = rules.AddSuccessRule("http://custom/proxy.pac");
TestCompletionCallback callback;
- InitProxyResolver init(&resolver, &fetcher, NULL);
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, NULL);
EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback));
EXPECT_EQ(rule.url, resolver.script_data()->url());
}
@@ -444,7 +494,7 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithPositiveDelay) {
TestCompletionCallback callback;
CapturingNetLog log(CapturingNetLog::kUnbounded);
- InitProxyResolver init(&resolver, &fetcher, &log);
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, &log);
EXPECT_EQ(ERR_IO_PENDING,
init.Init(config, base::TimeDelta::FromMilliseconds(1),
NULL, &callback));
@@ -486,7 +536,7 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithNegativeDelay) {
TestCompletionCallback callback;
CapturingNetLog log(CapturingNetLog::kUnbounded);
- InitProxyResolver init(&resolver, &fetcher, &log);
+ NoDhcpInitProxyResolver init(&resolver, &fetcher, &log);
EXPECT_EQ(kFailedDownloading,
init.Init(config, base::TimeDelta::FromSeconds(-5),
NULL, &callback));
@@ -507,5 +557,99 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithNegativeDelay) {
entries, 3, NetLog::TYPE_INIT_PROXY_RESOLVER));
}
+class SynchronousSuccessProxyScriptFetcher : public DhcpProxyScriptFetcher {
+public:
+ int Fetch(string16* utf16_text, CompletionCallback* callback) OVERRIDE {
+ *utf16_text = expected_text_;
+ return OK;
+ }
+
+ void Cancel() OVERRIDE {
+ }
+
+ URLRequestContext* GetRequestContext() const OVERRIDE {
+ return NULL;
+ }
+
+ GURL GetPacURL() const OVERRIDE {
+ return GURL("http://dhcppac/");
+ }
+
+ // Set this before your test.
+ static string16 expected_text_;
+};
+
+string16 SynchronousSuccessProxyScriptFetcher::expected_text_;
+
+// Returns a DHCP fetcher that returns success immediately.
+class SynchronousDhcpInitProxyResolver : public InitProxyResolver {
+ public:
+ SynchronousDhcpInitProxyResolver(ProxyResolver* resolver,
+ URLProxyScriptFetcher* proxy_script_fetcher,
+ NetLog* net_log)
+ : InitProxyResolver(resolver, proxy_script_fetcher, net_log) {
+ }
+
+ DhcpProxyScriptFetcher* ImplCreateDhcpProxyScriptFetcher(
+ URLRequestContext* url_request_context) OVERRIDE {
+ return new SynchronousSuccessProxyScriptFetcher();
+ }
+};
+
+// All of the tests above that use NoDhcpInitProxyResolver have tested
+// failure to fetch a PAC file via DHCP configuration, so we now test
+// success at downloading and parsing, and then success at downloading,
+// failure at parsing.
+
+TEST(InitProxyResolverTest, AutodetectDhcpSuccess) {
+ Rules rules;
+ RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/);
+ RuleBasedProxyScriptFetcher fetcher(&rules);
+
+ ProxyConfig config;
+ config.set_auto_detect(true);
+
+ rules.AddSuccessRule("http://bingo/");
+ rules.AddFailDownloadRule("http://wpad/wpad.dat");
+ SynchronousSuccessProxyScriptFetcher::expected_text_ =
+ WideToUTF16(L"http://bingo/!valid-script");
+
+ TestCompletionCallback callback;
+ ProxyConfig effective_config;
+ SynchronousDhcpInitProxyResolver init(&resolver, &fetcher, NULL);
+ EXPECT_EQ(OK, init.Init(
+ config, base::TimeDelta(), &effective_config, &callback));
+ EXPECT_EQ(SynchronousSuccessProxyScriptFetcher::expected_text_,
+ resolver.script_data()->utf16());
+
+ EXPECT_TRUE(effective_config.has_pac_url());
+ EXPECT_EQ(GURL("http://dhcppac/"), effective_config.pac_url());
+}
+
+TEST(InitProxyResolverTest, AutodetectDhcpFailParse) {
+ Rules rules;
+ RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/);
+ RuleBasedProxyScriptFetcher fetcher(&rules);
+
+ ProxyConfig config;
+ config.set_auto_detect(true);
+
+ rules.AddFailParsingRule("http://bingo/");
+ rules.AddFailDownloadRule("http://wpad/wpad.dat");
+ SynchronousSuccessProxyScriptFetcher::expected_text_ =
+ WideToUTF16(L"http://bingo/!invalid-script");
+
+ TestCompletionCallback callback;
+ ProxyConfig effective_config;
+ SynchronousDhcpInitProxyResolver init(&resolver, &fetcher, NULL);
+ // Since there is fallback to DNS-based WPAD, the final error will be that
+ // it failed downloading, not that it failed parsing.
+ EXPECT_EQ(kFailedDownloading,
+ init.Init(config, base::TimeDelta(), &effective_config, &callback));
+ EXPECT_EQ(NULL, resolver.script_data());
+
+ EXPECT_FALSE(effective_config.has_pac_url());
+}
+
} // namespace
} // namespace net

Powered by Google App Engine
This is Rietveld 408576698