Index: net/proxy/init_proxy_resolver_unittest.cc |
diff --git a/net/proxy/init_proxy_resolver_unittest.cc b/net/proxy/init_proxy_resolver_unittest.cc |
index b0d416d33777f482e3e18b86e2570d7bd41da3e7..628abee45acccfe80d5ea01af7ef5f65d476addf 100644 |
--- a/net/proxy/init_proxy_resolver_unittest.cc |
+++ b/net/proxy/init_proxy_resolver_unittest.cc |
@@ -11,6 +11,7 @@ |
#include "net/base/net_log_unittest.h" |
#include "net/base/test_completion_callback.h" |
#include "net/proxy/init_proxy_resolver.h" |
+#include "net/proxy/dhcp_proxy_script_fetcher.h" |
#include "net/proxy/proxy_config.h" |
#include "net/proxy/proxy_resolver.h" |
#include "net/proxy/proxy_script_fetcher.h" |
@@ -107,7 +108,7 @@ class RuleBasedProxyScriptFetcher : public ProxyScriptFetcher { |
virtual void Cancel() {} |
- virtual URLRequestContext* GetRequestContext() { return NULL; } |
+ virtual URLRequestContext* GetRequestContext() const { return NULL; } |
private: |
const Rules* rules_; |
@@ -174,6 +175,7 @@ TEST(InitProxyResolverTest, CustomPacSucceeds) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_pac_url(GURL("http://custom/proxy.pac")); |
@@ -182,8 +184,10 @@ TEST(InitProxyResolverTest, CustomPacSucceeds) { |
TestCompletionCallback callback; |
CapturingNetLog log(CapturingNetLog::kUnbounded); |
- InitProxyResolver init(&resolver, &fetcher, &log); |
- EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback)); |
+ ProxyConfig effective_config; |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, &log); |
+ EXPECT_EQ(OK, init.Init( |
+ config, base::TimeDelta(), &effective_config, &callback)); |
EXPECT_EQ(rule.text(), resolver.script_data()->utf16()); |
// Check the NetLog was filled correctly. |
@@ -203,6 +207,9 @@ TEST(InitProxyResolverTest, CustomPacSucceeds) { |
entries, 4, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEndEvent( |
entries, 5, NetLog::TYPE_INIT_PROXY_RESOLVER)); |
+ |
+ EXPECT_TRUE(effective_config.has_pac_url()); |
+ EXPECT_EQ(config.pac_url(), effective_config.pac_url()); |
} |
// Fail downloading the custom PAC script. |
@@ -210,6 +217,7 @@ TEST(InitProxyResolverTest, CustomPacFails1) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_pac_url(GURL("http://custom/proxy.pac")); |
@@ -218,9 +226,10 @@ TEST(InitProxyResolverTest, CustomPacFails1) { |
TestCompletionCallback callback; |
CapturingNetLog log(CapturingNetLog::kUnbounded); |
- InitProxyResolver init(&resolver, &fetcher, &log); |
+ ProxyConfig effective_config; |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, &log); |
EXPECT_EQ(kFailedDownloading, |
- init.Init(config, base::TimeDelta(), NULL, &callback)); |
+ init.Init(config, base::TimeDelta(), &effective_config, &callback)); |
EXPECT_EQ(NULL, resolver.script_data()); |
// Check the NetLog was filled correctly. |
@@ -236,6 +245,8 @@ TEST(InitProxyResolverTest, CustomPacFails1) { |
entries, 2, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEndEvent( |
entries, 3, NetLog::TYPE_INIT_PROXY_RESOLVER)); |
+ |
+ EXPECT_FALSE(effective_config.has_pac_url()); |
} |
// Fail parsing the custom PAC script. |
@@ -243,6 +254,7 @@ TEST(InitProxyResolverTest, CustomPacFails2) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_pac_url(GURL("http://custom/proxy.pac")); |
@@ -250,7 +262,7 @@ TEST(InitProxyResolverTest, CustomPacFails2) { |
rules.AddFailParsingRule("http://custom/proxy.pac"); |
TestCompletionCallback callback; |
- InitProxyResolver init(&resolver, &fetcher, NULL); |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
EXPECT_EQ(kFailedParsing, |
init.Init(config, base::TimeDelta(), NULL, &callback)); |
EXPECT_EQ(NULL, resolver.script_data()); |
@@ -260,22 +272,24 @@ TEST(InitProxyResolverTest, CustomPacFails2) { |
TEST(InitProxyResolverTest, HasNullProxyScriptFetcher) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_pac_url(GURL("http://custom/proxy.pac")); |
TestCompletionCallback callback; |
- InitProxyResolver init(&resolver, NULL, NULL); |
+ InitProxyResolver init(&resolver, NULL, &dhcp_fetcher, NULL); |
EXPECT_EQ(ERR_UNEXPECTED, |
init.Init(config, base::TimeDelta(), NULL, &callback)); |
EXPECT_EQ(NULL, resolver.script_data()); |
} |
-// Succeeds in choosing autodetect (wpad). |
+// Succeeds in choosing autodetect (WPAD DNS). |
TEST(InitProxyResolverTest, AutodetectSuccess) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_auto_detect(true); |
@@ -283,9 +297,14 @@ TEST(InitProxyResolverTest, AutodetectSuccess) { |
Rules::Rule rule = rules.AddSuccessRule("http://wpad/wpad.dat"); |
TestCompletionCallback callback; |
- InitProxyResolver init(&resolver, &fetcher, NULL); |
- EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback)); |
+ ProxyConfig effective_config; |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
+ EXPECT_EQ(OK, init.Init( |
+ config, base::TimeDelta(), &effective_config, &callback)); |
EXPECT_EQ(rule.text(), resolver.script_data()->utf16()); |
+ |
+ EXPECT_TRUE(effective_config.has_pac_url()); |
+ EXPECT_EQ(rule.url, effective_config.pac_url()); |
} |
// Fails at WPAD (downloading), but succeeds in choosing the custom PAC. |
@@ -293,6 +312,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess1) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_auto_detect(true); |
@@ -302,16 +322,23 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess1) { |
Rules::Rule rule = rules.AddSuccessRule("http://custom/proxy.pac"); |
TestCompletionCallback callback; |
- InitProxyResolver init(&resolver, &fetcher, NULL); |
- EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback)); |
+ ProxyConfig effective_config; |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
+ EXPECT_EQ(OK, init.Init( |
+ config, base::TimeDelta(), &effective_config, &callback)); |
EXPECT_EQ(rule.text(), resolver.script_data()->utf16()); |
+ |
+ EXPECT_TRUE(effective_config.has_pac_url()); |
+ EXPECT_EQ(rule.url, effective_config.pac_url()); |
} |
-// Fails at WPAD (parsing), but succeeds in choosing the custom PAC. |
+// Fails at WPAD (no DHCP config, DNS PAC fails parsing), but succeeds in |
+// choosing the custom PAC. |
TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_auto_detect(true); |
@@ -325,7 +352,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2) { |
CapturingNetLog log(CapturingNetLog::kUnbounded); |
ProxyConfig effective_config; |
- InitProxyResolver init(&resolver, &fetcher, &log); |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, &log); |
EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), |
&effective_config, &callback)); |
EXPECT_EQ(rule.text(), resolver.script_data()->utf16()); |
@@ -336,36 +363,48 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2) { |
ProxyConfig::CreateFromCustomPacURL(GURL("http://custom/proxy.pac")))); |
// Check the NetLog was filled correctly. |
- // (Note that the Fetch and Set states are repeated since both WPAD and custom |
+ // (Note that various states are repeated since both WPAD and custom |
// PAC scripts are tried). |
CapturingNetLog::EntryList entries; |
log.GetEntries(&entries); |
- EXPECT_EQ(11u, entries.size()); |
+ EXPECT_EQ(14u, entries.size()); |
EXPECT_TRUE(LogContainsBeginEvent( |
entries, 0, NetLog::TYPE_INIT_PROXY_RESOLVER)); |
+ // This is the DHCP phase, which fails fetching rather than parsing, so |
+ // there is no pair of SET_PAC_SCRIPT events. |
EXPECT_TRUE(LogContainsBeginEvent( |
entries, 1, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEndEvent( |
entries, 2, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
+ EXPECT_TRUE(LogContainsEvent( |
+ entries, 3, |
+ NetLog::TYPE_INIT_PROXY_RESOLVER_FALLING_BACK_TO_NEXT_PAC_SOURCE, |
+ NetLog::PHASE_NONE)); |
+ // This is the DNS phase, which attempts a fetch but fails. |
EXPECT_TRUE(LogContainsBeginEvent( |
- entries, 3, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
+ entries, 4, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEndEvent( |
- entries, 4, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
+ entries, 5, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
+ EXPECT_TRUE(LogContainsBeginEvent( |
+ entries, 6, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
+ EXPECT_TRUE(LogContainsEndEvent( |
+ entries, 7, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEvent( |
- entries, 5, |
- NetLog::TYPE_INIT_PROXY_RESOLVER_FALLING_BACK_TO_NEXT_PAC_URL, |
+ entries, 8, |
+ NetLog::TYPE_INIT_PROXY_RESOLVER_FALLING_BACK_TO_NEXT_PAC_SOURCE, |
NetLog::PHASE_NONE)); |
+ // Finally, the custom PAC URL phase. |
EXPECT_TRUE(LogContainsBeginEvent( |
- entries, 6, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
+ entries, 9, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEndEvent( |
- entries, 7, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
+ entries, 10, NetLog::TYPE_INIT_PROXY_RESOLVER_FETCH_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsBeginEvent( |
- entries, 8, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
+ entries, 11, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEndEvent( |
- entries, 9, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
+ entries, 12, NetLog::TYPE_INIT_PROXY_RESOLVER_SET_PAC_SCRIPT)); |
EXPECT_TRUE(LogContainsEndEvent( |
- entries, 10, NetLog::TYPE_INIT_PROXY_RESOLVER)); |
+ entries, 13, NetLog::TYPE_INIT_PROXY_RESOLVER)); |
} |
// Fails at WPAD (downloading), and fails at custom PAC (downloading). |
@@ -373,6 +412,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomFails1) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_auto_detect(true); |
@@ -382,7 +422,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomFails1) { |
rules.AddFailDownloadRule("http://custom/proxy.pac"); |
TestCompletionCallback callback; |
- InitProxyResolver init(&resolver, &fetcher, NULL); |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
EXPECT_EQ(kFailedDownloading, |
init.Init(config, base::TimeDelta(), NULL, &callback)); |
EXPECT_EQ(NULL, resolver.script_data()); |
@@ -393,6 +433,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomFails2) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_auto_detect(true); |
@@ -402,7 +443,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomFails2) { |
rules.AddFailParsingRule("http://custom/proxy.pac"); |
TestCompletionCallback callback; |
- InitProxyResolver init(&resolver, &fetcher, NULL); |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
EXPECT_EQ(kFailedParsing, |
init.Init(config, base::TimeDelta(), NULL, &callback)); |
EXPECT_EQ(NULL, resolver.script_data()); |
@@ -415,6 +456,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2_NoFetch) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, false /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_auto_detect(true); |
@@ -424,7 +466,7 @@ TEST(InitProxyResolverTest, AutodetectFailCustomSuccess2_NoFetch) { |
Rules::Rule rule = rules.AddSuccessRule("http://custom/proxy.pac"); |
TestCompletionCallback callback; |
- InitProxyResolver init(&resolver, &fetcher, NULL); |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
EXPECT_EQ(OK, init.Init(config, base::TimeDelta(), NULL, &callback)); |
EXPECT_EQ(rule.url, resolver.script_data()->url()); |
} |
@@ -436,6 +478,7 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithPositiveDelay) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_pac_url(GURL("http://custom/proxy.pac")); |
@@ -444,7 +487,7 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithPositiveDelay) { |
TestCompletionCallback callback; |
CapturingNetLog log(CapturingNetLog::kUnbounded); |
- InitProxyResolver init(&resolver, &fetcher, &log); |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, &log); |
EXPECT_EQ(ERR_IO_PENDING, |
init.Init(config, base::TimeDelta::FromMilliseconds(1), |
NULL, &callback)); |
@@ -478,6 +521,7 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithNegativeDelay) { |
Rules rules; |
RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
RuleBasedProxyScriptFetcher fetcher(&rules); |
+ DoNothingDhcpProxyScriptFetcher dhcp_fetcher; |
ProxyConfig config; |
config.set_pac_url(GURL("http://custom/proxy.pac")); |
@@ -486,7 +530,7 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithNegativeDelay) { |
TestCompletionCallback callback; |
CapturingNetLog log(CapturingNetLog::kUnbounded); |
- InitProxyResolver init(&resolver, &fetcher, &log); |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, &log); |
EXPECT_EQ(kFailedDownloading, |
init.Init(config, base::TimeDelta::FromSeconds(-5), |
NULL, &callback)); |
@@ -507,5 +551,87 @@ TEST(InitProxyResolverTest, CustomPacFails1_WithNegativeDelay) { |
entries, 3, NetLog::TYPE_INIT_PROXY_RESOLVER)); |
} |
+class SynchronousSuccessDhcpFetcher : public DhcpProxyScriptFetcher { |
+ public: |
+ explicit SynchronousSuccessDhcpFetcher(const string16& expected_text) |
+ : gurl_("http://dhcppac/"), expected_text_(expected_text) { |
+ } |
+ |
+ int Fetch(string16* utf16_text, CompletionCallback* callback) OVERRIDE { |
+ *utf16_text = expected_text_; |
+ return OK; |
+ } |
+ |
+ void Cancel() OVERRIDE { |
+ } |
+ |
+ const GURL& GetPacURL() const OVERRIDE { |
+ return gurl_; |
+ } |
+ |
+ const string16& expected_text() const { |
+ return expected_text_; |
+ } |
+ |
+ private: |
+ GURL gurl_; |
+ string16 expected_text_; |
+}; |
+ |
+// All of the tests above that use InitProxyResolver have tested |
+// failure to fetch a PAC file via DHCP configuration, so we now test |
+// success at downloading and parsing, and then success at downloading, |
+// failure at parsing. |
+ |
+TEST(InitProxyResolverTest, AutodetectDhcpSuccess) { |
+ Rules rules; |
+ RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
+ RuleBasedProxyScriptFetcher fetcher(&rules); |
+ SynchronousSuccessDhcpFetcher dhcp_fetcher( |
+ WideToUTF16(L"http://bingo/!valid-script")); |
+ |
+ ProxyConfig config; |
+ config.set_auto_detect(true); |
+ |
+ rules.AddSuccessRule("http://bingo/"); |
+ rules.AddFailDownloadRule("http://wpad/wpad.dat"); |
+ |
+ TestCompletionCallback callback; |
+ ProxyConfig effective_config; |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
+ EXPECT_EQ(OK, init.Init( |
+ config, base::TimeDelta(), &effective_config, &callback)); |
+ EXPECT_EQ(dhcp_fetcher.expected_text(), |
+ resolver.script_data()->utf16()); |
+ |
+ EXPECT_TRUE(effective_config.has_pac_url()); |
+ EXPECT_EQ(GURL("http://dhcppac/"), effective_config.pac_url()); |
+} |
+ |
+TEST(InitProxyResolverTest, AutodetectDhcpFailParse) { |
+ Rules rules; |
+ RuleBasedProxyResolver resolver(&rules, true /*expects_pac_bytes*/); |
+ RuleBasedProxyScriptFetcher fetcher(&rules); |
+ SynchronousSuccessDhcpFetcher dhcp_fetcher( |
+ WideToUTF16(L"http://bingo/!invalid-script")); |
+ |
+ ProxyConfig config; |
+ config.set_auto_detect(true); |
+ |
+ rules.AddFailParsingRule("http://bingo/"); |
+ rules.AddFailDownloadRule("http://wpad/wpad.dat"); |
+ |
+ TestCompletionCallback callback; |
+ ProxyConfig effective_config; |
+ InitProxyResolver init(&resolver, &fetcher, &dhcp_fetcher, NULL); |
+ // Since there is fallback to DNS-based WPAD, the final error will be that |
+ // it failed downloading, not that it failed parsing. |
+ EXPECT_EQ(kFailedDownloading, |
+ init.Init(config, base::TimeDelta(), &effective_config, &callback)); |
+ EXPECT_EQ(NULL, resolver.script_data()); |
+ |
+ EXPECT_FALSE(effective_config.has_pac_url()); |
+} |
+ |
} // namespace |
} // namespace net |