Index: net/base/host_resolver_impl_unittest.cc |
diff --git a/net/base/host_resolver_impl_unittest.cc b/net/base/host_resolver_impl_unittest.cc |
index b99dbf7b064d8ad818ce8bc13d555039eba9ddff..e49d4f295e85058f09be828548e6d7d8c686f0b8 100644 |
--- a/net/base/host_resolver_impl_unittest.cc |
+++ b/net/base/host_resolver_impl_unittest.cc |
@@ -28,15 +28,18 @@ |
#include "net/base/net_util.h" |
#include "net/base/sys_addrinfo.h" |
#include "net/base/test_completion_callback.h" |
+#include "net/dns/dns_client.h" |
+#include "net/dns/dns_test_util.h" |
#include "testing/gtest/include/gtest/gtest.h" |
namespace net { |
+namespace { |
using base::TimeDelta; |
using base::TimeTicks; |
-static const size_t kMaxJobs = 10u; |
-static const size_t kMaxRetryAttempts = 4u; |
+const size_t kMaxJobs = 10u; |
+const size_t kMaxRetryAttempts = 4u; |
PrioritizedDispatcher::Limits DefaultLimits() { |
PrioritizedDispatcher::Limits limits(NUM_PRIORITIES, kMaxJobs); |
@@ -58,6 +61,17 @@ HostResolverImpl* CreateHostResolverImpl(HostResolverProc* resolver_proc) { |
NULL); |
} |
+HostResolverImpl* CreateHostResolverImplWithDns( |
mmenke
2012/03/13 15:56:27
nit: Suggest "CreateHostResolverImplWithDnsConfig
|
+ HostResolverProc* resolver_proc, |
+ scoped_ptr<DnsConfigService> config_service) { |
+ return new HostResolverImpl( |
+ HostCache::CreateDefaultCache(), |
+ DefaultLimits(), |
+ DefaultParams(resolver_proc), |
+ config_service.Pass(), |
+ NULL); |
+} |
+ |
// This HostResolverImpl will only allow 1 outstanding resolve at a time. |
HostResolverImpl* CreateSerialHostResolverImpl( |
HostResolverProc* resolver_proc) { |
@@ -425,6 +439,20 @@ class ResolveRequest { |
EXPECT_EQ(ERR_IO_PENDING, err); |
} |
+ ResolveRequest(HostResolver* resolver, |
mmenke
2012/03/13 15:56:27
Think you should comment that this is only for syn
|
+ const std::string& hostname, |
+ int port) |
+ : info_(HostPortPair(hostname, port)), |
+ resolver_(resolver), |
+ delegate_(NULL) { |
+ // Start the request. |
+ result_ = resolver->Resolve( |
+ info_, &addrlist_, |
+ base::Bind(&ResolveRequest::OnLookupFinished, base::Unretained(this)), |
+ &req_, BoundNetLog()); |
+ EXPECT_NE(ERR_IO_PENDING, result_); |
+ } |
+ |
void Cancel() { |
resolver_->CancelRequest(req_); |
} |
@@ -451,6 +479,9 @@ class ResolveRequest { |
private: |
void OnLookupFinished(int result) { |
+ EXPECT_TRUE(delegate_ != NULL); |
+ if (delegate_ == NULL) |
+ return; |
result_ = result; |
delegate_->OnCompleted(this); |
} |
@@ -870,7 +901,8 @@ TEST_F(HostResolverImplTest, CancelMultipleRequests) { |
MessageLoop::current()->Run(); |
} |
-// Helper class used by HostResolverImplTest.CanceledRequestsReleaseJobSlots. |
+// Delegate which allows to wait for specific number of requests to complete. |
+// Used by HostResolverImplTest.CanceledRequestsReleaseJobSlots and .DnsTask. |
class CountingDelegate : public ResolveRequest::Delegate { |
public: |
CountingDelegate() : num_completions_(0) {} |
@@ -882,6 +914,11 @@ class CountingDelegate : public ResolveRequest::Delegate { |
unsigned num_completions() const { return num_completions_; } |
+ void WaitUntil(unsigned completions) { |
mmenke
2012/03/13 15:56:27
optional nit: Suggest "WaitFor" or "WaitForComple
|
+ while (num_completions_ < completions) |
+ MessageLoop::current()->Run(); |
mmenke
2012/03/13 15:56:27
Rather than repeatedly entering message loops agai
szym
2012/03/13 18:14:29
I think it's the other way around: because anyone
mmenke
2012/03/13 18:27:50
You don't want anyone else exiting the message loo
|
+ } |
+ |
private: |
unsigned num_completions_; |
}; |
@@ -918,8 +955,7 @@ TEST_F(HostResolverImplTest, CanceledRequestsReleaseJobSlots) { |
resolver_proc->SignalAll(); |
- while (delegate.num_completions() < 2) |
- MessageLoop::current()->Run(); |
+ delegate.WaitUntil(2); |
EXPECT_EQ(0u, host_resolver->num_running_jobs_for_tests()); |
} |
@@ -1750,6 +1786,101 @@ TEST_F(HostResolverImplTest, MultipleAttempts) { |
EXPECT_EQ(resolver_proc->resolved_attempt_number(), kAttemptNumberToResolve); |
} |
+DnsConfig CreateValidDnsConfig() { |
+ IPAddressNumber dns_ip; |
+ bool rv = ParseIPLiteralToNumber("192.168.1.0", &dns_ip); |
+ EXPECT_TRUE(rv); |
+ |
+ DnsConfig config; |
+ config.nameservers.push_back(IPEndPoint(dns_ip, |
+ dns_protocol::kDefaultPort)); |
+ EXPECT_TRUE(config.IsValid()); |
+ return config; |
+} |
+ |
+// Test successful and fallback resolutions in HostResolverImpl::DnsTask. |
+TEST_F(HostResolverImplTest, DnsTask) { |
+ scoped_refptr<RuleBasedHostResolverProc> resolver_proc( |
+ new RuleBasedHostResolverProc(NULL)); |
+ scoped_ptr<HostResolverImpl> host_resolver(CreateHostResolverImpl( |
+ resolver_proc)); |
+ |
+ resolver_proc->AddRule("er_succeed", "192.168.1.101"); |
+ resolver_proc->AddRule("nx_succeed", "192.168.1.102"); |
+ resolver_proc->AddSimulatedFailure("ok_fail"); |
+ resolver_proc->AddSimulatedFailure("er_fail"); |
+ resolver_proc->AddSimulatedFailure("nx_fail"); |
+ |
+ CountingDelegate delegate; |
+ |
+ // Initially there is no config, so client should not be invoked. |
+ ResolveRequest req1(host_resolver.get(), "ok_fail", 80, &delegate); |
+ |
+ delegate.WaitUntil(1); |
+ EXPECT_EQ(ERR_NAME_NOT_RESOLVED, req1.result()); |
+ |
+ host_resolver->set_dns_client_for_tests( |
+ CreateMockDnsClient(CreateValidDnsConfig())); |
+ |
+ ResolveRequest req2(host_resolver.get(), "ok_fail", 80, &delegate); |
+ ResolveRequest req3(host_resolver.get(), "er_fail", 80, &delegate); |
+ ResolveRequest req4(host_resolver.get(), "nx_fail", 80, &delegate); |
+ ResolveRequest req5(host_resolver.get(), "er_succeed", 80, &delegate); |
+ ResolveRequest req6(host_resolver.get(), "nx_succeed", 80, &delegate); |
+ |
+ delegate.WaitUntil(6); |
+ EXPECT_EQ(OK, req2.result()); |
mmenke
2012/03/13 15:56:27
Should the OK checks be ASSERTs to prevent crashin
|
+ // Resolved by MockDnsClient. |
+ EXPECT_EQ("127.0.0.1", NetAddressToString(req2.addrlist().head())); |
+ EXPECT_EQ(ERR_NAME_NOT_RESOLVED, req3.result()); |
+ EXPECT_EQ(ERR_NAME_NOT_RESOLVED, req4.result()); |
+ EXPECT_EQ(OK, req5.result()); |
+ EXPECT_EQ("192.168.1.101", NetAddressToString(req5.addrlist().head())); |
+ EXPECT_EQ(OK, req6.result()); |
+ EXPECT_EQ("192.168.1.102", NetAddressToString(req6.addrlist().head())); |
+} |
+ |
+TEST_F(HostResolverImplTest, ServeFromHosts) { |
+ scoped_refptr<RuleBasedHostResolverProc> resolver_proc( |
+ new RuleBasedHostResolverProc(NULL)); |
+ MockDnsConfigService* config_service = new MockDnsConfigService(); |
+ scoped_ptr<HostResolverImpl> host_resolver(CreateHostResolverImplWithDns( |
+ resolver_proc, |
+ scoped_ptr<DnsConfigService>(config_service))); |
+ |
+ resolver_proc->AddSimulatedFailure("*"); |
+ |
+ DnsConfig config = CreateValidDnsConfig(); |
+ host_resolver->set_dns_client_for_tests(CreateMockDnsClient(config)); |
+ |
+ CountingDelegate delegate; |
+ |
+ ResolveRequest req1(host_resolver.get(), "er_ipv4", 80, &delegate); |
+ delegate.WaitUntil(1); |
+ EXPECT_EQ(ERR_NAME_NOT_RESOLVED, req1.result()); |
+ |
+ IPAddressNumber local_ipv4, local_ipv6; |
+ ASSERT_TRUE(ParseIPLiteralToNumber("127.0.0.1", &local_ipv4)); |
+ ASSERT_TRUE(ParseIPLiteralToNumber("::1", &local_ipv6)); |
+ |
+ DnsHosts hosts; |
+ hosts[DnsHostsKey("er_ipv4", ADDRESS_FAMILY_IPV4)] = local_ipv4; |
+ hosts[DnsHostsKey("er_ipv6", ADDRESS_FAMILY_IPV6)] = local_ipv6; |
mmenke
2012/03/13 15:56:27
Suggest you add two or three ADDRESS_FAMILY_UNSPEC
szym
2012/03/13 18:14:29
DnsHosts will not have keys with ADDRESS_FAMILY_UN
mmenke
2012/03/13 18:27:50
Sorry, I was a little confused... You should have
szym
2012/03/13 19:04:00
I don't want to test the IPv4 preference unless we
|
+ |
+ config_service->ChangeConfig(config); |
+ config_service->ChangeHosts(hosts); |
+ |
+ ResolveRequest req2(host_resolver.get(), "er_ipv4", 80); |
+ EXPECT_EQ(OK, req2.result()); |
+ EXPECT_EQ("127.0.0.1", NetAddressToString(req2.addrlist().head())); |
+ ResolveRequest req3(host_resolver.get(), "er_ipv6", 80); |
+ EXPECT_EQ(OK, req3.result()); |
+ EXPECT_EQ("::1", NetAddressToString(req3.addrlist().head())); |
+} |
+ |
+// TODO(szym): Test AbortAllInProgressJobs due to DnsConfig change. |
+ |
// TODO(cbentzel): Test a mix of requests with different HostResolverFlags. |
+} // namespace |
} // namespace net |