Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index e782b886b48b670ccd0f2becacd42032e01fa061..f7f773874194f5b3b0c6bd7b8f2d5b1f3ecc08bd 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -77,6 +77,7 @@ |
#include "net/socket/ssl_client_socket.h" |
#include "net/ssl/ssl_cipher_suite_names.h" |
#include "net/ssl/ssl_connection_status_flags.h" |
+#include "net/ssl/ssl_server_config.h" |
#include "net/test/cert_test_util.h" |
#include "net/test/embedded_test_server/embedded_test_server.h" |
#include "net/test/embedded_test_server/http_request.h" |
@@ -225,7 +226,6 @@ void FillBuffer(char* buffer, size_t len) { |
} |
#endif |
-#if !defined(OS_IOS) |
void TestLoadTimingCacheHitNoNetwork( |
const LoadTimingInfo& load_timing_info) { |
EXPECT_FALSE(load_timing_info.socket_reused); |
@@ -318,6 +318,7 @@ void CheckFullRequestHeaders(const HttpRequestHeaders& headers, |
EXPECT_EQ("keep-alive", sent_value); |
} |
+#if !defined(OS_IOS) |
bool FingerprintsEqual(const HashValueVector& a, const HashValueVector& b) { |
size_t size = a.size(); |
@@ -2193,40 +2194,17 @@ TEST_F(URLRequestTest, PriorityIgnoreLimits) { |
EXPECT_EQ(MAXIMUM_PRIORITY, job->priority()); |
} |
-// TODO(droger): Support SpawnedTestServer on iOS (see http://crbug.com/148666). |
-#if !defined(OS_IOS) |
namespace { |
// Less verbose way of running a simple testserver for the tests below. |
-class LocalHttpTestServer : public SpawnedTestServer { |
+class LocalHttpTestServer : public EmbeddedTestServer { |
public: |
- explicit LocalHttpTestServer(const base::FilePath& document_root) |
- : SpawnedTestServer(SpawnedTestServer::TYPE_HTTP, |
- SpawnedTestServer::kLocalhost, |
- document_root) {} |
- LocalHttpTestServer() |
- : SpawnedTestServer(SpawnedTestServer::TYPE_HTTP, |
- SpawnedTestServer::kLocalhost, |
- base::FilePath()) {} |
-}; |
+ explicit LocalHttpTestServer(const base::FilePath& document_root) { |
+ AddDefaultHandlers(document_root); |
+ } |
-scoped_ptr<net::test_server::HttpResponse> HandleSetCookieRequest( |
- const test_server::HttpRequest& request) { |
- scoped_ptr<test_server::BasicHttpResponse> http_response( |
- new test_server::BasicHttpResponse()); |
- if (request.relative_url.find("/set-cookie?") != 0) { |
- http_response->set_code(net::HTTP_NOT_FOUND); |
- http_response->set_content("hello"); |
- return http_response.Pass(); |
- } |
- http_response->set_code(net::HTTP_OK); |
- http_response->set_content("hello"); |
- http_response->set_content_type("text/plain"); |
- http_response->AddCustomHeader( |
- "Set-Cookie", |
- request.relative_url.substr(request.relative_url.find("?") + 1)); |
- return http_response.Pass(); |
-} |
+ LocalHttpTestServer() { AddDefaultHandlers(base::FilePath()); } |
+}; |
} // namespace |
@@ -2246,7 +2224,7 @@ TEST_F(URLRequestTest, DelayedCookieCallback) { |
context.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2261,7 +2239,7 @@ TEST_F(URLRequestTest, DelayedCookieCallback) { |
context.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2282,7 +2260,7 @@ TEST_F(URLRequestTest, DoNotSendCookies) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2296,7 +2274,7 @@ TEST_F(URLRequestTest, DoNotSendCookies) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2312,7 +2290,7 @@ TEST_F(URLRequestTest, DoNotSendCookies) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->SetLoadFlags(LOAD_DO_NOT_SEND_COOKIES); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2336,7 +2314,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2352,7 +2330,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"), |
+ test_server.GetURL("/set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"), |
DEFAULT_PRIORITY, &d)); |
req->SetLoadFlags(LOAD_DO_NOT_SAVE_COOKIES); |
req->Start(); |
@@ -2371,7 +2349,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2396,7 +2374,7 @@ TEST_F(URLRequestTest, DoNotSendCookies_ViaPolicy) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2411,7 +2389,7 @@ TEST_F(URLRequestTest, DoNotSendCookies_ViaPolicy) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2429,7 +2407,7 @@ TEST_F(URLRequestTest, DoNotSendCookies_ViaPolicy) { |
TestDelegate d; |
network_delegate.set_cookie_options(TestNetworkDelegate::NO_GET_COOKIES); |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2451,7 +2429,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies_ViaPolicy) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2467,7 +2445,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies_ViaPolicy) { |
TestDelegate d; |
network_delegate.set_cookie_options(TestNetworkDelegate::NO_SET_COOKIE); |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"), |
+ test_server.GetURL("/set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
@@ -2483,7 +2461,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies_ViaPolicy) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2507,7 +2485,7 @@ TEST_F(URLRequestTest, DoNotSaveEmptyCookies) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/set-cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2527,7 +2505,7 @@ TEST_F(URLRequestTest, DoNotSendCookies_ViaPolicy_Async) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2542,7 +2520,7 @@ TEST_F(URLRequestTest, DoNotSendCookies_ViaPolicy_Async) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2560,7 +2538,7 @@ TEST_F(URLRequestTest, DoNotSendCookies_ViaPolicy_Async) { |
TestDelegate d; |
network_delegate.set_cookie_options(TestNetworkDelegate::NO_GET_COOKIES); |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2582,7 +2560,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies_ViaPolicy_Async) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2598,7 +2576,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies_ViaPolicy_Async) { |
TestDelegate d; |
network_delegate.set_cookie_options(TestNetworkDelegate::NO_SET_COOKIE); |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"), |
+ test_server.GetURL("/set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
@@ -2614,7 +2592,7 @@ TEST_F(URLRequestTest, DoNotSaveCookies_ViaPolicy_Async) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2642,7 +2620,7 @@ TEST_F(URLRequestTest, FirstPartyOnlyCookiesEnabled) { |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
test_server.GetURL( |
- "set-cookie?FirstPartyCookieToSet=1;First-Party-Only"), |
+ "/set-cookie?FirstPartyCookieToSet=1;First-Party-Only"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2658,8 +2636,8 @@ TEST_F(URLRequestTest, FirstPartyOnlyCookiesEnabled) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
- req->set_first_party_for_cookies(test_server.GetURL("")); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ req->set_first_party_for_cookies(test_server.GetURL("/")); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2676,7 +2654,7 @@ TEST_F(URLRequestTest, FirstPartyOnlyCookiesEnabled) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->set_first_party_for_cookies(GURL("http://third-party.test/")); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2702,7 +2680,7 @@ TEST_F(URLRequestTest, FirstPartyOnlyCookiesDisabled) { |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
test_server.GetURL( |
- "set-cookie?FirstPartyCookieToSet=1;First-Party-Only"), |
+ "/set-cookie?FirstPartyCookieToSet=1;First-Party-Only"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2718,8 +2696,8 @@ TEST_F(URLRequestTest, FirstPartyOnlyCookiesDisabled) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
- req->set_first_party_for_cookies(test_server.GetURL("")); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ req->set_first_party_for_cookies(test_server.GetURL("/")); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2736,7 +2714,7 @@ TEST_F(URLRequestTest, FirstPartyOnlyCookiesDisabled) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->set_first_party_for_cookies(GURL("http://third-party.test/")); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2750,13 +2728,14 @@ TEST_F(URLRequestTest, FirstPartyOnlyCookiesDisabled) { |
// Tests that $Secure- cookies can't be set on non-secure origins. |
TEST_F(URLRequestTest, SecureCookiePrefixOnNonsecureOrigin) { |
- test_server::EmbeddedTestServer test_server; |
- test_server.RegisterRequestHandler(base::Bind(&HandleSetCookieRequest)); |
- ASSERT_TRUE(test_server.InitializeAndWaitUntilReady()); |
- SpawnedTestServer test_server_https( |
- SpawnedTestServer::TYPE_HTTPS, SpawnedTestServer::kLocalhost, |
+ EmbeddedTestServer http_server; |
+ http_server.AddDefaultHandlers( |
+ base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ EmbeddedTestServer https_server(EmbeddedTestServer::TYPE_HTTPS); |
+ https_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
- ASSERT_TRUE(test_server_https.Start()); |
+ ASSERT_TRUE(http_server.Start()); |
+ ASSERT_TRUE(https_server.Start()); |
TestExperimentalFeaturesNetworkDelegate network_delegate; |
TestURLRequestContext context(true); |
@@ -2768,7 +2747,7 @@ TEST_F(URLRequestTest, SecureCookiePrefixOnNonsecureOrigin) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("/set-cookie?$Secure-nonsecure-origin=1;Secure"), |
+ http_server.GetURL("/set-cookie?$Secure-nonsecure-origin=1;Secure"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2780,7 +2759,7 @@ TEST_F(URLRequestTest, SecureCookiePrefixOnNonsecureOrigin) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server_https.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ https_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2792,10 +2771,10 @@ TEST_F(URLRequestTest, SecureCookiePrefixOnNonsecureOrigin) { |
} |
TEST_F(URLRequestTest, SecureCookiePrefixNonexperimental) { |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, SpawnedTestServer::kLocalhost, |
+ EmbeddedTestServer https_server(EmbeddedTestServer::TYPE_HTTPS); |
+ https_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
- ASSERT_TRUE(test_server.Start()); |
+ ASSERT_TRUE(https_server.Start()); |
TestNetworkDelegate network_delegate; |
TestURLRequestContext context(true); |
@@ -2809,7 +2788,7 @@ TEST_F(URLRequestTest, SecureCookiePrefixNonexperimental) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("set-cookie?$Secure-nonsecure-not-experimental=1"), |
+ https_server.GetURL("/set-cookie?$Secure-nonsecure-not-experimental=1"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2821,8 +2800,8 @@ TEST_F(URLRequestTest, SecureCookiePrefixNonexperimental) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL( |
- "set-cookie?$Secure-secure-not-experimental=1;Secure"), |
+ https_server.GetURL( |
+ "/set-cookie?$Secure-secure-not-experimental=1;Secure"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2835,7 +2814,7 @@ TEST_F(URLRequestTest, SecureCookiePrefixNonexperimental) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ https_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2850,10 +2829,10 @@ TEST_F(URLRequestTest, SecureCookiePrefixNonexperimental) { |
} |
TEST_F(URLRequestTest, SecureCookiePrefixExperimentalNonsecure) { |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, SpawnedTestServer::kLocalhost, |
+ EmbeddedTestServer https_server(EmbeddedTestServer::TYPE_HTTPS); |
+ https_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
- ASSERT_TRUE(test_server.Start()); |
+ ASSERT_TRUE(https_server.Start()); |
TestExperimentalFeaturesNetworkDelegate network_delegate; |
TestURLRequestContext context(true); |
@@ -2864,8 +2843,9 @@ TEST_F(URLRequestTest, SecureCookiePrefixExperimentalNonsecure) { |
// enabled. |
{ |
TestDelegate d; |
- scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("set-cookie?$Secure-foo=1"), DEFAULT_PRIORITY, &d)); |
+ scoped_ptr<URLRequest> req( |
+ context.CreateRequest(https_server.GetURL("/set-cookie?$Secure-foo=1"), |
+ DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
EXPECT_EQ(0, network_delegate.blocked_get_cookies_count()); |
@@ -2876,7 +2856,7 @@ TEST_F(URLRequestTest, SecureCookiePrefixExperimentalNonsecure) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ https_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -2887,10 +2867,10 @@ TEST_F(URLRequestTest, SecureCookiePrefixExperimentalNonsecure) { |
} |
TEST_F(URLRequestTest, SecureCookiePrefixExperimentalSecure) { |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, SpawnedTestServer::kLocalhost, |
+ EmbeddedTestServer https_server(EmbeddedTestServer::TYPE_HTTPS); |
+ https_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
- ASSERT_TRUE(test_server.Start()); |
+ ASSERT_TRUE(https_server.Start()); |
TestExperimentalFeaturesNetworkDelegate network_delegate; |
TestURLRequestContext context(true); |
@@ -2902,8 +2882,8 @@ TEST_F(URLRequestTest, SecureCookiePrefixExperimentalSecure) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("set-cookie?$Secure-bar=1;Secure"), DEFAULT_PRIORITY, |
- &d)); |
+ https_server.GetURL("/set-cookie?$Secure-bar=1;Secure"), |
+ DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
EXPECT_EQ(0, network_delegate.blocked_get_cookies_count()); |
@@ -2914,7 +2894,7 @@ TEST_F(URLRequestTest, SecureCookiePrefixExperimentalSecure) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ https_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -3009,7 +2989,7 @@ TEST_F(URLRequestTest, AcceptClockSkewCookieWithWrongDateTimezone) { |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
test_server.GetURL( |
- "set-cookie?StillGood=1;expires=Mon,18-Apr-1977,22:50:13,GMT"), |
+ "/set-cookie?StillGood=1;expires=Mon,18-Apr-1977,22:50:13,GMT"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -3020,7 +3000,7 @@ TEST_F(URLRequestTest, AcceptClockSkewCookieWithWrongDateTimezone) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -3033,7 +3013,7 @@ TEST_F(URLRequestTest, AcceptClockSkewCookieWithWrongDateTimezone) { |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
test_server.GetURL( |
- "set-cookie?StillGood=1;expires=Mon,18-Apr-1977,22:50:13,GMT"), |
+ "/set-cookie?StillGood=1;expires=Mon,18-Apr-1977,22:50:13,GMT"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -3044,7 +3024,7 @@ TEST_F(URLRequestTest, AcceptClockSkewCookieWithWrongDateTimezone) { |
default_context_.set_network_delegate(&network_delegate); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Cookie"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -3064,7 +3044,7 @@ TEST_F(URLRequestTest, DoNotOverrideReferrer) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
req->SetReferrer("http://foo.com/"); |
HttpRequestHeaders headers; |
@@ -3082,7 +3062,7 @@ TEST_F(URLRequestTest, DoNotOverrideReferrer) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server.GetURL("echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
HttpRequestHeaders headers; |
headers.SetHeader(HttpRequestHeaders::kReferer, "http://bar.com/"); |
@@ -3208,7 +3188,7 @@ class URLRequestTestHTTP : public URLRequestTest { |
for (int i = 0; i < kIterations; ++i) { |
TestDelegate d; |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("echo"), DEFAULT_PRIORITY, &d)); |
+ test_server_.GetURL("/echo"), DEFAULT_PRIORITY, &d)); |
r->set_method(method.c_str()); |
r->set_upload(CreateSimpleUploadData(uploadBytes)); |
@@ -3255,7 +3235,7 @@ class URLRequestTestHTTP : public URLRequestTest { |
bool DoManyCookiesRequest(int num_cookies) { |
TestDelegate d; |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("set-many-cookies?" + |
+ test_server_.GetURL("/set-many-cookies?" + |
base::IntToString(num_cookies)), |
DEFAULT_PRIORITY, &d)); |
@@ -3266,35 +3246,50 @@ class URLRequestTestHTTP : public URLRequestTest { |
bool is_success = r->status().is_success(); |
- if (!is_success) { |
+ if (!is_success) |
EXPECT_TRUE(r->status().error() == ERR_RESPONSE_HEADERS_TOO_BIG); |
- // The test server appears to be unable to handle subsequent requests |
- // after this error is triggered. Force it to restart. |
- EXPECT_TRUE(test_server_.Stop()); |
- EXPECT_TRUE(test_server_.Start()); |
- } |
return is_success; |
} |
- LocalHttpTestServer* test_server() { |
- return &test_server_; |
- } |
+ LocalHttpTestServer* http_test_server() { return &test_server_; } |
- protected: |
+ private: |
LocalHttpTestServer test_server_; |
}; |
-// In this unit test, we're using the HTTPTestServer as a proxy server and |
+namespace { |
+ |
+scoped_ptr<test_server::HttpResponse> HandleRedirectConnect( |
+ const test_server::HttpRequest& request) { |
+ if (request.headers.find("Host") == request.headers.end() || |
+ request.headers.at("Host") != "www.redirect.com" || |
+ request.method != test_server::METHOD_CONNECT) { |
+ return nullptr; |
+ } |
+ |
+ scoped_ptr<test_server::BasicHttpResponse> http_response( |
+ new test_server::BasicHttpResponse); |
+ http_response->set_code(HTTP_FOUND); |
+ http_response->AddCustomHeader("Location", |
+ "http://www.destination.com/foo.js"); |
+ return http_response.Pass(); |
+} |
+ |
+} // namespace |
+ |
+// In this unit test, we're using the EmbeddedTestServer as a proxy server and |
// issuing a CONNECT request with the magic host name "www.redirect.com". |
-// The HTTPTestServer will return a 302 response, which we should not |
+// The EmbeddedTestServer will return a 302 response, which we should not |
// follow. |
TEST_F(URLRequestTestHTTP, ProxyTunnelRedirectTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ http_test_server()->RegisterRequestHandler( |
+ base::Bind(&HandleRedirectConnect)); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestNetworkDelegate network_delegate; // Must outlive URLRequest. |
TestURLRequestContextWithProxy context( |
- test_server_.host_port_pair().ToString(), &network_delegate); |
+ http_test_server()->host_port_pair().ToString(), &network_delegate); |
TestDelegate d; |
{ |
@@ -3318,11 +3313,11 @@ TEST_F(URLRequestTestHTTP, ProxyTunnelRedirectTest) { |
// This is the same as the previous test, but checks that the network delegate |
// registers the error. |
TEST_F(URLRequestTestHTTP, NetworkDelegateTunnelConnectionFailed) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestNetworkDelegate network_delegate; // Must outlive URLRequest. |
TestURLRequestContextWithProxy context( |
- test_server_.host_port_pair().ToString(), &network_delegate); |
+ http_test_server()->host_port_pair().ToString(), &network_delegate); |
TestDelegate d; |
{ |
@@ -3355,7 +3350,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateBlockAsynchronously) { |
}; |
static const size_t blocking_stages_length = arraysize(blocking_stages); |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3371,7 +3366,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateBlockAsynchronously) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL("empty.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
for (size_t i = 0; i < blocking_stages_length; ++i) { |
@@ -3391,7 +3386,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateBlockAsynchronously) { |
// Tests that the network delegate can block and cancel a request. |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3400,11 +3395,11 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequest) { |
network_delegate.set_retval(ERR_EMPTY_RESPONSE); |
TestURLRequestContextWithProxy context( |
- test_server_.host_port_pair().ToString(), &network_delegate); |
+ http_test_server()->host_port_pair().ToString(), &network_delegate); |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -3454,66 +3449,66 @@ void NetworkDelegateCancelRequest(BlockingNetworkDelegate::BlockMode block_mode, |
// The following 3 tests check that the network delegate can cancel a request |
// synchronously in various stages of the request. |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequestSynchronously1) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
NetworkDelegateCancelRequest(BlockingNetworkDelegate::SYNCHRONOUS, |
BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST, |
- test_server_.GetURL(std::string())); |
+ http_test_server()->GetURL("/")); |
} |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequestSynchronously2) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
NetworkDelegateCancelRequest(BlockingNetworkDelegate::SYNCHRONOUS, |
BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS, |
- test_server_.GetURL(std::string())); |
+ http_test_server()->GetURL("/")); |
} |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequestSynchronously3) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
NetworkDelegateCancelRequest(BlockingNetworkDelegate::SYNCHRONOUS, |
BlockingNetworkDelegate::ON_HEADERS_RECEIVED, |
- test_server_.GetURL(std::string())); |
+ http_test_server()->GetURL("/")); |
} |
// The following 3 tests check that the network delegate can cancel a request |
// asynchronously in various stages of the request. |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequestAsynchronously1) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
NetworkDelegateCancelRequest(BlockingNetworkDelegate::AUTO_CALLBACK, |
BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST, |
- test_server_.GetURL(std::string())); |
+ http_test_server()->GetURL("/")); |
} |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequestAsynchronously2) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
NetworkDelegateCancelRequest(BlockingNetworkDelegate::AUTO_CALLBACK, |
BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS, |
- test_server_.GetURL(std::string())); |
+ http_test_server()->GetURL("/")); |
} |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelRequestAsynchronously3) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
NetworkDelegateCancelRequest(BlockingNetworkDelegate::AUTO_CALLBACK, |
BlockingNetworkDelegate::ON_HEADERS_RECEIVED, |
- test_server_.GetURL(std::string())); |
+ http_test_server()->GetURL("/")); |
} |
// Tests that the network delegate can block and redirect a request to a new |
// URL. |
TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
BlockingNetworkDelegate::AUTO_CALLBACK); |
network_delegate.set_block_on(BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST); |
- GURL redirect_url(test_server_.GetURL("simple.html")); |
+ GURL redirect_url(http_test_server()->GetURL("/simple.html")); |
network_delegate.set_redirect_url(redirect_url); |
TestURLRequestContextWithProxy context( |
- test_server_.host_port_pair().ToString(), &network_delegate); |
+ http_test_server()->host_port_pair().ToString(), &network_delegate); |
{ |
- GURL original_url(test_server_.GetURL("empty.html")); |
+ GURL original_url(http_test_server()->GetURL("/defaultresponse")); |
scoped_ptr<URLRequest> r( |
context.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
@@ -3535,12 +3530,11 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequest) { |
r->FollowDeferredRedirect(); |
base::RunLoop().Run(); |
EXPECT_EQ(URLRequestStatus::SUCCESS, r->status().status()); |
- EXPECT_TRUE(r->proxy_server().Equals(test_server_.host_port_pair())); |
+ EXPECT_TRUE(r->proxy_server().Equals(http_test_server()->host_port_pair())); |
EXPECT_EQ( |
1, network_delegate.observed_before_proxy_headers_sent_callbacks()); |
- EXPECT_TRUE( |
- network_delegate.last_observed_proxy().Equals( |
- test_server_.host_port_pair())); |
+ EXPECT_TRUE(network_delegate.last_observed_proxy().Equals( |
+ http_test_server()->host_port_pair())); |
EXPECT_EQ(0, r->status().error()); |
EXPECT_EQ(redirect_url, r->url()); |
@@ -3555,19 +3549,19 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequest) { |
// Tests that the network delegate can block and redirect a request to a new |
// URL by setting a redirect_url and returning in OnBeforeURLRequest directly. |
TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestSynchronously) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
BlockingNetworkDelegate::SYNCHRONOUS); |
- GURL redirect_url(test_server_.GetURL("simple.html")); |
+ GURL redirect_url(http_test_server()->GetURL("/simple.html")); |
network_delegate.set_redirect_url(redirect_url); |
TestURLRequestContextWithProxy context( |
- test_server_.host_port_pair().ToString(), &network_delegate); |
+ http_test_server()->host_port_pair().ToString(), &network_delegate); |
{ |
- GURL original_url(test_server_.GetURL("empty.html")); |
+ GURL original_url(http_test_server()->GetURL("/defaultresponse")); |
scoped_ptr<URLRequest> r( |
context.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
@@ -3590,12 +3584,11 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestSynchronously) { |
base::RunLoop().Run(); |
EXPECT_EQ(URLRequestStatus::SUCCESS, r->status().status()); |
- EXPECT_TRUE(r->proxy_server().Equals(test_server_.host_port_pair())); |
+ EXPECT_TRUE(r->proxy_server().Equals(http_test_server()->host_port_pair())); |
EXPECT_EQ( |
1, network_delegate.observed_before_proxy_headers_sent_callbacks()); |
- EXPECT_TRUE( |
- network_delegate.last_observed_proxy().Equals( |
- test_server_.host_port_pair())); |
+ EXPECT_TRUE(network_delegate.last_observed_proxy().Equals( |
+ http_test_server()->host_port_pair())); |
EXPECT_EQ(0, r->status().error()); |
EXPECT_EQ(redirect_url, r->url()); |
EXPECT_EQ(original_url, r->original_url()); |
@@ -3608,7 +3601,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestSynchronously) { |
// Tests that redirects caused by the network delegate preserve POST data. |
TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestPost) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
const char kData[] = "hello world"; |
@@ -3616,7 +3609,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestPost) { |
BlockingNetworkDelegate network_delegate( |
BlockingNetworkDelegate::AUTO_CALLBACK); |
network_delegate.set_block_on(BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST); |
- GURL redirect_url(test_server_.GetURL("echo")); |
+ GURL redirect_url(http_test_server()->GetURL("/echo")); |
network_delegate.set_redirect_url(redirect_url); |
TestURLRequestContext context(true); |
@@ -3624,7 +3617,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestPost) { |
context.Init(); |
{ |
- GURL original_url(test_server_.GetURL("empty.html")); |
+ GURL original_url(http_test_server()->GetURL("/defaultresponse")); |
scoped_ptr<URLRequest> r( |
context.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
r->set_method("POST"); |
@@ -3668,20 +3661,20 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestPost) { |
// Tests that the network delegate can block and redirect a request to a new |
// URL during OnHeadersReceived. |
TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestOnHeadersReceived) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
BlockingNetworkDelegate::AUTO_CALLBACK); |
network_delegate.set_block_on(BlockingNetworkDelegate::ON_HEADERS_RECEIVED); |
- GURL redirect_url(test_server_.GetURL("simple.html")); |
+ GURL redirect_url(http_test_server()->GetURL("/simple.html")); |
network_delegate.set_redirect_on_headers_received_url(redirect_url); |
TestURLRequestContextWithProxy context( |
- test_server_.host_port_pair().ToString(), &network_delegate); |
+ http_test_server()->host_port_pair().ToString(), &network_delegate); |
{ |
- GURL original_url(test_server_.GetURL("empty.html")); |
+ GURL original_url(http_test_server()->GetURL("/defaultresponse")); |
scoped_ptr<URLRequest> r( |
context.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
@@ -3689,12 +3682,11 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestOnHeadersReceived) { |
base::RunLoop().Run(); |
EXPECT_EQ(URLRequestStatus::SUCCESS, r->status().status()); |
- EXPECT_TRUE(r->proxy_server().Equals(test_server_.host_port_pair())); |
+ EXPECT_TRUE(r->proxy_server().Equals(http_test_server()->host_port_pair())); |
EXPECT_EQ( |
2, network_delegate.observed_before_proxy_headers_sent_callbacks()); |
- EXPECT_TRUE( |
- network_delegate.last_observed_proxy().Equals( |
- test_server_.host_port_pair())); |
+ EXPECT_TRUE(network_delegate.last_observed_proxy().Equals( |
+ http_test_server()->host_port_pair())); |
EXPECT_EQ(OK, r->status().error()); |
EXPECT_EQ(redirect_url, r->url()); |
@@ -3711,7 +3703,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateRedirectRequestOnHeadersReceived) { |
// handle the challenge, and is passing the buck along to the |
// URLRequest::Delegate. |
TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncNoAction) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3724,7 +3716,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncNoAction) { |
d.set_credentials(AuthCredentials(kUser, kSecret)); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
@@ -3742,7 +3734,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncNoAction) { |
TEST_F(URLRequestTestHTTP, |
NetworkDelegateOnAuthRequiredSyncNoAction_GetFullRequestHeaders) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3755,7 +3747,7 @@ TEST_F(URLRequestTestHTTP, |
d.set_credentials(AuthCredentials(kUser, kSecret)); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
@@ -3780,7 +3772,7 @@ TEST_F(URLRequestTestHTTP, |
// Tests that the network delegate can synchronously complete OnAuthRequired |
// by setting credentials. |
TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncSetAuth) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3796,7 +3788,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncSetAuth) { |
context.Init(); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -3815,7 +3807,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncSetAuth) { |
// headers (for the first or second request) when called at the proper times. |
TEST_F(URLRequestTestHTTP, |
NetworkDelegateOnAuthRequiredSyncSetAuth_GetFullRequestHeaders) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3831,7 +3823,7 @@ TEST_F(URLRequestTestHTTP, |
context.Init(); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -3855,7 +3847,7 @@ TEST_F(URLRequestTestHTTP, |
// Tests that the network delegate can synchronously complete OnAuthRequired |
// by cancelling authentication. |
TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncCancel) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3869,7 +3861,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncCancel) { |
context.Init(); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -3889,7 +3881,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredSyncCancel) { |
// to handle the challenge, and is passing the buck along to the |
// URLRequest::Delegate. |
TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncNoAction) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3903,7 +3895,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncNoAction) { |
d.set_credentials(AuthCredentials(kUser, kSecret)); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -3921,7 +3913,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncNoAction) { |
// Tests that the network delegate can asynchronously complete OnAuthRequired |
// by setting credentials. |
TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncSetAuth) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3938,7 +3930,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncSetAuth) { |
context.Init(); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -3957,7 +3949,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncSetAuth) { |
// Tests that the network delegate can asynchronously complete OnAuthRequired |
// by cancelling authentication. |
TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncCancel) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -3971,7 +3963,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncCancel) { |
context.Init(); |
{ |
- GURL url(test_server_.GetURL("auth-basic")); |
+ GURL url(http_test_server()->GetURL("/auth-basic")); |
scoped_ptr<URLRequest> r(context.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -3990,7 +3982,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateOnAuthRequiredAsyncCancel) { |
// waiting for the network delegate. |
// Part 1: Request is cancelled while waiting for OnBeforeURLRequest callback. |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting1) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -4003,7 +3995,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting1) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -4026,7 +4018,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting1) { |
// waiting for the network delegate. |
// Part 2: Request is cancelled while waiting for OnBeforeSendHeaders callback. |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting2) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -4040,7 +4032,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting2) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -4063,7 +4055,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting2) { |
// waiting for the network delegate. |
// Part 3: Request is cancelled while waiting for OnHeadersReceived callback. |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting3) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -4076,7 +4068,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting3) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -4099,7 +4091,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting3) { |
// waiting for the network delegate. |
// Part 4: Request is cancelled while waiting for OnAuthRequired callback. |
TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting4) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
BlockingNetworkDelegate network_delegate( |
@@ -4112,7 +4104,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting4) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL("auth-basic"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/auth-basic"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -4131,15 +4123,37 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateCancelWhileWaiting4) { |
EXPECT_EQ(1, network_delegate.destroyed_requests()); |
} |
-// In this unit test, we're using the HTTPTestServer as a proxy server and |
+namespace { |
+ |
+scoped_ptr<test_server::HttpResponse> HandleServerAuthConnect( |
+ const test_server::HttpRequest& request) { |
+ if (request.headers.find("Host") == request.headers.end() || |
+ request.headers.at("Host") != "www.server-auth.com" || |
+ request.method != test_server::METHOD_CONNECT) { |
+ return nullptr; |
+ } |
+ |
+ scoped_ptr<test_server::BasicHttpResponse> http_response( |
+ new test_server::BasicHttpResponse); |
+ http_response->set_code(HTTP_UNAUTHORIZED); |
+ http_response->AddCustomHeader("WWW-Authenticate", |
+ "Basic realm=\"WallyWorld\""); |
+ return http_response.Pass(); |
+} |
+ |
+} // namespace |
+ |
+// In this unit test, we're using the EmbeddedTestServer as a proxy server and |
// issuing a CONNECT request with the magic host name "www.server-auth.com". |
-// The HTTPTestServer will return a 401 response, which we should balk at. |
+// The EmbeddedTestServer will return a 401 response, which we should balk at. |
TEST_F(URLRequestTestHTTP, UnexpectedServerAuthTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ http_test_server()->RegisterRequestHandler( |
+ base::Bind(&HandleServerAuthConnect)); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestNetworkDelegate network_delegate; // Must outlive URLRequest. |
TestURLRequestContextWithProxy context( |
- test_server_.host_port_pair().ToString(), &network_delegate); |
+ http_test_server()->host_port_pair().ToString(), &network_delegate); |
TestDelegate d; |
{ |
@@ -4159,12 +4173,12 @@ TEST_F(URLRequestTestHTTP, UnexpectedServerAuthTest) { |
} |
TEST_F(URLRequestTestHTTP, GetTest_NoCache) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -4174,9 +4188,9 @@ TEST_F(URLRequestTestHTTP, GetTest_NoCache) { |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_FALSE(d.received_data_before_response()); |
EXPECT_NE(0, d.bytes_received()); |
- EXPECT_EQ(test_server_.host_port_pair().host(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().host(), |
r->GetSocketAddress().host()); |
- EXPECT_EQ(test_server_.host_port_pair().port(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().port(), |
r->GetSocketAddress().port()); |
// TODO(eroman): Add back the NetLog tests... |
@@ -4195,7 +4209,7 @@ TEST_F(URLRequestTestHTTP, GetTest_NoCache) { |
#define MAYBE_GetTest_ManyCookies GetTest_ManyCookies |
#endif // defined(OS_WIN) |
TEST_F(URLRequestTestHTTP, MAYBE_GetTest_ManyCookies) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
int lower_bound = 0; |
int upper_bound = 1; |
@@ -4226,12 +4240,12 @@ TEST_F(URLRequestTestHTTP, MAYBE_GetTest_ManyCookies) { |
} |
TEST_F(URLRequestTestHTTP, GetTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -4241,19 +4255,19 @@ TEST_F(URLRequestTestHTTP, GetTest) { |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_FALSE(d.received_data_before_response()); |
EXPECT_NE(0, d.bytes_received()); |
- EXPECT_EQ(test_server_.host_port_pair().host(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().host(), |
r->GetSocketAddress().host()); |
- EXPECT_EQ(test_server_.host_port_pair().port(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().port(), |
r->GetSocketAddress().port()); |
} |
} |
TEST_F(URLRequestTestHTTP, GetTest_GetFullRequestHeaders) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
- GURL test_url(test_server_.GetURL(std::string())); |
+ GURL test_url(http_test_server()->GetURL("/defaultresponse")); |
scoped_ptr<URLRequest> r( |
default_context_.CreateRequest(test_url, DEFAULT_PRIORITY, &d)); |
@@ -4268,9 +4282,9 @@ TEST_F(URLRequestTestHTTP, GetTest_GetFullRequestHeaders) { |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_FALSE(d.received_data_before_response()); |
EXPECT_NE(0, d.bytes_received()); |
- EXPECT_EQ(test_server_.host_port_pair().host(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().host(), |
r->GetSocketAddress().host()); |
- EXPECT_EQ(test_server_.host_port_pair().port(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().port(), |
r->GetSocketAddress().port()); |
EXPECT_TRUE(d.have_full_request_headers()); |
@@ -4279,12 +4293,12 @@ TEST_F(URLRequestTestHTTP, GetTest_GetFullRequestHeaders) { |
} |
TEST_F(URLRequestTestHTTP, GetTestLoadTiming) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -4298,15 +4312,21 @@ TEST_F(URLRequestTestHTTP, GetTestLoadTiming) { |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_FALSE(d.received_data_before_response()); |
EXPECT_NE(0, d.bytes_received()); |
- EXPECT_EQ(test_server_.host_port_pair().host(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().host(), |
r->GetSocketAddress().host()); |
- EXPECT_EQ(test_server_.host_port_pair().port(), |
+ EXPECT_EQ(http_test_server()->host_port_pair().port(), |
r->GetSocketAddress().port()); |
} |
} |
+// TODO(droger): Support SpawnedTestServer on iOS (see http://crbug.com/148666). |
+#if !defined(OS_IOS) |
TEST_F(URLRequestTestHTTP, GetZippedTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ SpawnedTestServer test_server(SpawnedTestServer::TYPE_HTTP, |
+ SpawnedTestServer::kLocalhost, |
+ base::FilePath(kTestFilePath)); |
+ |
+ ASSERT_TRUE(test_server.Start()); |
// Parameter that specifies the Content-Length field in the response: |
// C - Compressed length. |
@@ -4325,9 +4345,8 @@ TEST_F(URLRequestTestHTTP, GetZippedTest) { |
for (int i = 0; i < num_tests ; i++) { |
TestDelegate d; |
{ |
- std::string test_file = |
- base::StringPrintf("compressedfiles/BullRunSpeech.txt?%c", |
- test_parameters[i]); |
+ std::string test_file = base::StringPrintf( |
+ "compressedfiles/BullRunSpeech.txt?%c", test_parameters[i]); |
TestNetworkDelegate network_delegate; // Must outlive URLRequest. |
TestURLRequestContext context(true); |
@@ -4335,7 +4354,7 @@ TEST_F(URLRequestTestHTTP, GetZippedTest) { |
context.Init(); |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL(test_file), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL(test_file), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -4357,9 +4376,10 @@ TEST_F(URLRequestTestHTTP, GetZippedTest) { |
} |
} |
} |
+#endif // !defined(OS_IOS) |
TEST_F(URLRequestTestHTTP, NetworkQualityEstimator) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
// Enable requests to local host to be used for network quality estimation. |
std::map<std::string, std::string> variation_params; |
NetworkQualityEstimator estimator(scoped_ptr<net::ExternalEstimateProvider>(), |
@@ -4372,10 +4392,10 @@ TEST_F(URLRequestTestHTTP, NetworkQualityEstimator) { |
context.set_network_delegate(&network_delegate); |
context.Init(); |
- std::string url = "echo.html"; |
+ std::string url = "/defaultresponse"; |
- scoped_ptr<URLRequest> r( |
- context.CreateRequest(test_server_.GetURL(url), DEFAULT_PRIORITY, &d)); |
+ scoped_ptr<URLRequest> r(context.CreateRequest( |
+ http_test_server()->GetURL(url), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -4402,11 +4422,11 @@ TEST_F(URLRequestTestHTTP, NetworkQualityEstimator) { |
} |
TEST_F(URLRequestTestHTTP, RedirectLoadTiming) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL destination_url = test_server_.GetURL(std::string()); |
+ GURL destination_url = http_test_server()->GetURL("/"); |
GURL original_url = |
- test_server_.GetURL("server-redirect?" + destination_url.spec()); |
+ http_test_server()->GetURL("/server-redirect?" + destination_url.spec()); |
TestDelegate d; |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
@@ -4441,13 +4461,13 @@ TEST_F(URLRequestTestHTTP, RedirectLoadTiming) { |
} |
TEST_F(URLRequestTestHTTP, MultipleRedirectTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL destination_url = test_server_.GetURL(std::string()); |
+ GURL destination_url = http_test_server()->GetURL("/"); |
GURL middle_redirect_url = |
- test_server_.GetURL("server-redirect?" + destination_url.spec()); |
- GURL original_url = test_server_.GetURL( |
- "server-redirect?" + middle_redirect_url.spec()); |
+ http_test_server()->GetURL("/server-redirect?" + destination_url.spec()); |
+ GURL original_url = http_test_server()->GetURL("/server-redirect?" + |
+ middle_redirect_url.spec()); |
TestDelegate d; |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
@@ -4768,7 +4788,7 @@ class AsyncLoggingUrlRequestDelegate : public TestDelegate { |
// Tests handling of delegate info before a request starts. |
TEST_F(URLRequestTestHTTP, DelegateInfoBeforeStart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate request_delegate; |
TestURLRequestContext context(true); |
@@ -4778,7 +4798,7 @@ TEST_F(URLRequestTestHTTP, DelegateInfoBeforeStart) { |
{ |
scoped_ptr<URLRequest> r( |
- context.CreateRequest(test_server_.GetURL("empty.html"), |
+ context.CreateRequest(http_test_server()->GetURL("/defaultresponse"), |
DEFAULT_PRIORITY, &request_delegate)); |
LoadStateWithParam load_state = r->GetLoadState(); |
EXPECT_EQ(LOAD_STATE_IDLE, load_state.state); |
@@ -4814,7 +4834,7 @@ TEST_F(URLRequestTestHTTP, DelegateInfoBeforeStart) { |
// Tests handling of delegate info from a network delegate. |
TEST_F(URLRequestTestHTTP, NetworkDelegateInfo) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate request_delegate; |
AsyncLoggingNetworkDelegate network_delegate; |
@@ -4825,7 +4845,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateInfo) { |
{ |
scoped_ptr<URLRequest> r( |
- context.CreateRequest(test_server_.GetURL("simple.html"), |
+ context.CreateRequest(http_test_server()->GetURL("/simple.html"), |
DEFAULT_PRIORITY, &request_delegate)); |
LoadStateWithParam load_state = r->GetLoadState(); |
EXPECT_EQ(LOAD_STATE_IDLE, load_state.state); |
@@ -4871,7 +4891,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateInfo) { |
// Tests handling of delegate info from a network delegate in the case of an |
// HTTP redirect. |
TEST_F(URLRequestTestHTTP, NetworkDelegateInfoRedirect) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate request_delegate; |
AsyncLoggingNetworkDelegate network_delegate; |
@@ -4882,8 +4902,8 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateInfoRedirect) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL("server-redirect?simple.html"), DEFAULT_PRIORITY, |
- &request_delegate)); |
+ http_test_server()->GetURL("/server-redirect?simple.html"), |
+ DEFAULT_PRIORITY, &request_delegate)); |
LoadStateWithParam load_state = r->GetLoadState(); |
EXPECT_EQ(LOAD_STATE_IDLE, load_state.state); |
EXPECT_EQ(base::string16(), load_state.param); |
@@ -4953,7 +4973,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateInfoRedirect) { |
// Tests handling of delegate info from a network delegate in the case of HTTP |
// AUTH. |
TEST_F(URLRequestTestHTTP, NetworkDelegateInfoAuth) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate request_delegate; |
AsyncLoggingNetworkDelegate network_delegate; |
@@ -4964,7 +4984,7 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateInfoAuth) { |
{ |
scoped_ptr<URLRequest> r( |
- context.CreateRequest(test_server_.GetURL("auth-basic"), |
+ context.CreateRequest(http_test_server()->GetURL("/auth-basic"), |
DEFAULT_PRIORITY, &request_delegate)); |
LoadStateWithParam load_state = r->GetLoadState(); |
EXPECT_EQ(LOAD_STATE_IDLE, load_state.state); |
@@ -5010,9 +5030,15 @@ TEST_F(URLRequestTestHTTP, NetworkDelegateInfoAuth) { |
entries, log_position + 1, NetLog::TYPE_DELEGATE_INFO)); |
} |
+// TODO(droger): Support SpawnedTestServer on iOS (see http://crbug.com/148666). |
+#if !defined(OS_IOS) |
// Tests handling of delegate info from a URLRequest::Delegate. |
TEST_F(URLRequestTestHTTP, URLRequestDelegateInfo) { |
- ASSERT_TRUE(test_server_.Start()); |
+ SpawnedTestServer test_server(SpawnedTestServer::TYPE_HTTP, |
+ SpawnedTestServer::kLocalhost, |
+ base::FilePath(kTestFilePath)); |
+ |
+ ASSERT_TRUE(test_server.Start()); |
AsyncLoggingUrlRequestDelegate request_delegate( |
AsyncLoggingUrlRequestDelegate::NO_CANCEL); |
@@ -5028,7 +5054,7 @@ TEST_F(URLRequestTestHTTP, URLRequestDelegateInfo) { |
// the possibility of multiple reads being combined in the unlikely event |
// that it occurs. |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL("chunked?waitBetweenChunks=20"), DEFAULT_PRIORITY, |
+ test_server.GetURL("/chunked?waitBetweenChunks=20"), DEFAULT_PRIORITY, |
&request_delegate)); |
LoadStateWithParam load_state = r->GetLoadState(); |
r->Start(); |
@@ -5066,11 +5092,12 @@ TEST_F(URLRequestTestHTTP, URLRequestDelegateInfo) { |
EXPECT_FALSE(LogContainsEntryWithTypeAfter( |
entries, log_position + 1, NetLog::TYPE_URL_REQUEST_DELEGATE)); |
} |
+#endif // !defined(OS_IOS) |
// Tests handling of delegate info from a URLRequest::Delegate in the case of |
// an HTTP redirect. |
TEST_F(URLRequestTestHTTP, URLRequestDelegateInfoOnRedirect) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
AsyncLoggingUrlRequestDelegate request_delegate( |
AsyncLoggingUrlRequestDelegate::NO_CANCEL); |
@@ -5081,8 +5108,8 @@ TEST_F(URLRequestTestHTTP, URLRequestDelegateInfoOnRedirect) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL("server-redirect?simple.html"), DEFAULT_PRIORITY, |
- &request_delegate)); |
+ http_test_server()->GetURL("/server-redirect?simple.html"), |
+ DEFAULT_PRIORITY, &request_delegate)); |
LoadStateWithParam load_state = r->GetLoadState(); |
r->Start(); |
base::RunLoop().Run(); |
@@ -5126,7 +5153,7 @@ TEST_F(URLRequestTestHTTP, URLRequestDelegateInfoOnRedirect) { |
// Tests handling of delegate info from a URLRequest::Delegate in the case of |
// an HTTP redirect, with cancellation at various points. |
TEST_F(URLRequestTestHTTP, URLRequestDelegateOnRedirectCancelled) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
const AsyncLoggingUrlRequestDelegate::CancelStage kCancelStages[] = { |
AsyncLoggingUrlRequestDelegate::CANCEL_ON_RECEIVED_REDIRECT, |
@@ -5145,8 +5172,8 @@ TEST_F(URLRequestTestHTTP, URLRequestDelegateOnRedirectCancelled) { |
{ |
scoped_ptr<URLRequest> r(context.CreateRequest( |
- test_server_.GetURL("server-redirect?simple.html"), DEFAULT_PRIORITY, |
- &request_delegate)); |
+ http_test_server()->GetURL("/server-redirect?simple.html"), |
+ DEFAULT_PRIORITY, &request_delegate)); |
LoadStateWithParam load_state = r->GetLoadState(); |
r->Start(); |
base::RunLoop().Run(); |
@@ -5205,12 +5232,12 @@ class RedirectWithAdditionalHeadersDelegate : public TestDelegate { |
} // namespace |
TEST_F(URLRequestTestHTTP, RedirectWithAdditionalHeadersTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL destination_url = test_server_.GetURL( |
- "echoheader?" + std::string(kExtraHeader)); |
- GURL original_url = test_server_.GetURL( |
- "server-redirect?" + destination_url.spec()); |
+ GURL destination_url = |
+ http_test_server()->GetURL("/echoheader?" + std::string(kExtraHeader)); |
+ GURL original_url = |
+ http_test_server()->GetURL("/server-redirect?" + destination_url.spec()); |
RedirectWithAdditionalHeadersDelegate d; |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
@@ -5242,12 +5269,12 @@ class RedirectWithHeaderRemovalDelegate : public TestDelegate { |
} // namespace |
TEST_F(URLRequestTestHTTP, RedirectWithHeaderRemovalTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL destination_url = test_server_.GetURL( |
- "echoheader?" + std::string(kExtraHeaderToRemove)); |
- GURL original_url = test_server_.GetURL( |
- "server-redirect?" + destination_url.spec()); |
+ GURL destination_url = http_test_server()->GetURL( |
+ "/echoheader?" + std::string(kExtraHeaderToRemove)); |
+ GURL original_url = |
+ http_test_server()->GetURL("/server-redirect?" + destination_url.spec()); |
RedirectWithHeaderRemovalDelegate d; |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(original_url, DEFAULT_PRIORITY, &d)); |
@@ -5285,12 +5312,12 @@ TEST_F(URLRequestTestHTTP, CancelTest) { |
} |
TEST_F(URLRequestTestHTTP, CancelTest2) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/"), DEFAULT_PRIORITY, &d)); |
d.set_cancel_in_response_started(true); |
@@ -5307,12 +5334,12 @@ TEST_F(URLRequestTestHTTP, CancelTest2) { |
} |
TEST_F(URLRequestTestHTTP, CancelTest3) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/"), DEFAULT_PRIORITY, &d)); |
d.set_cancel_in_received_data(true); |
@@ -5332,12 +5359,12 @@ TEST_F(URLRequestTestHTTP, CancelTest3) { |
} |
TEST_F(URLRequestTestHTTP, CancelTest4) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -5358,13 +5385,13 @@ TEST_F(URLRequestTestHTTP, CancelTest4) { |
} |
TEST_F(URLRequestTestHTTP, CancelTest5) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
// populate cache |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("cachetime"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/cachetime"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
EXPECT_EQ(URLRequestStatus::SUCCESS, r->status().status()); |
@@ -5374,7 +5401,7 @@ TEST_F(URLRequestTestHTTP, CancelTest5) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("cachetime"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/cachetime"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
r->Cancel(); |
base::RunLoop().Run(); |
@@ -5387,22 +5414,22 @@ TEST_F(URLRequestTestHTTP, CancelTest5) { |
} |
TEST_F(URLRequestTestHTTP, PostTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
HTTPUploadDataOperationTest("POST"); |
} |
TEST_F(URLRequestTestHTTP, PutTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
HTTPUploadDataOperationTest("PUT"); |
} |
TEST_F(URLRequestTestHTTP, PostEmptyTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("echo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echo"), DEFAULT_PRIORITY, &d)); |
r->set_method("POST"); |
r->Start(); |
@@ -5420,12 +5447,12 @@ TEST_F(URLRequestTestHTTP, PostEmptyTest) { |
} |
TEST_F(URLRequestTestHTTP, PostFileTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("echo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echo"), DEFAULT_PRIORITY, &d)); |
r->set_method("POST"); |
base::FilePath dir; |
@@ -5469,12 +5496,12 @@ TEST_F(URLRequestTestHTTP, PostFileTest) { |
} |
TEST_F(URLRequestTestHTTP, PostUnreadableFileTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("echo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echo"), DEFAULT_PRIORITY, &d)); |
r->set_method("POST"); |
ScopedVector<UploadElementReader> element_readers; |
@@ -5501,12 +5528,12 @@ TEST_F(URLRequestTestHTTP, PostUnreadableFileTest) { |
} |
TEST_F(URLRequestTestHTTP, TestPostChunkedDataBeforeStart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("echo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echo"), DEFAULT_PRIORITY, &d)); |
r->EnableChunkedUpload(); |
r->set_method("POST"); |
AddChunksToUpload(r.get()); |
@@ -5520,12 +5547,12 @@ TEST_F(URLRequestTestHTTP, TestPostChunkedDataBeforeStart) { |
} |
TEST_F(URLRequestTestHTTP, TestPostChunkedDataJustAfterStart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("echo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echo"), DEFAULT_PRIORITY, &d)); |
r->EnableChunkedUpload(); |
r->set_method("POST"); |
r->Start(); |
@@ -5538,12 +5565,12 @@ TEST_F(URLRequestTestHTTP, TestPostChunkedDataJustAfterStart) { |
} |
TEST_F(URLRequestTestHTTP, TestPostChunkedDataAfterStart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("echo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echo"), DEFAULT_PRIORITY, &d)); |
r->EnableChunkedUpload(); |
r->set_method("POST"); |
r->Start(); |
@@ -5558,11 +5585,11 @@ TEST_F(URLRequestTestHTTP, TestPostChunkedDataAfterStart) { |
} |
TEST_F(URLRequestTestHTTP, ResponseHeadersTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/with-headers.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/with-headers.html"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -5586,20 +5613,22 @@ TEST_F(URLRequestTestHTTP, ResponseHeadersTest) { |
EXPECT_EQ("a, b", header); |
} |
+// TODO(svaldez): iOS tests are flaky with EmbeddedTestServer and transport |
+// security state. |
+#if !defined(OS_IOS) |
+ |
TEST_F(URLRequestTestHTTP, ProcessSTS) { |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
- |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TestDelegate d; |
scoped_ptr<URLRequest> request(default_context_.CreateRequest( |
- https_test_server.GetURL("files/hsts-headers.html"), DEFAULT_PRIORITY, |
- &d)); |
+ https_test_server.GetURL("/hsts-headers.html"), DEFAULT_PRIORITY, &d)); |
request->Start(); |
base::RunLoop().Run(); |
@@ -5623,22 +5652,20 @@ TEST_F(URLRequestTestHTTP, ProcessSTS) { |
} |
TEST_F(URLRequestTestHTTP, STSNotProcessedOnIP) { |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- SpawnedTestServer::SSLOptions(), |
- base::FilePath(kTestFilePath)); |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
// Make sure this test fails if the test server is changed to not |
// listen on an IP by default. |
- ASSERT_TRUE(https_test_server.GetURL("").HostIsIPAddress()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ ASSERT_TRUE(https_test_server.GetURL("/").HostIsIPAddress()); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TestDelegate d; |
scoped_ptr<URLRequest> request(default_context_.CreateRequest( |
- https_test_server.GetURL("files/hsts-headers.html"), DEFAULT_PRIORITY, |
- &d)); |
+ https_test_server.GetURL("/hsts-headers.html"), DEFAULT_PRIORITY, &d)); |
request->Start(); |
base::RunLoop().Run(); |
- |
TransportSecurityState* security_state = |
default_context_.transport_security_state(); |
TransportSecurityState::STSState sts_state; |
@@ -5671,22 +5698,20 @@ const char kHPKPReportUri[] = "https://hpkp-report.test"; |
// validity/expiration. |
TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKP) { |
GURL report_uri(kHPKPReportUri); |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TestDelegate d; |
scoped_ptr<URLRequest> request(default_context_.CreateRequest( |
- https_test_server.GetURL("files/hpkp-headers.html"), DEFAULT_PRIORITY, |
- &d)); |
+ https_test_server.GetURL("/hpkp-headers.html"), DEFAULT_PRIORITY, &d)); |
request->Start(); |
base::RunLoop().Run(); |
- |
TransportSecurityState* security_state = |
default_context_.transport_security_state(); |
TransportSecurityState::STSState sts_state; |
@@ -5707,15 +5732,14 @@ TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKP) { |
// Tests that reports get sent on HPKP violations when a report-uri is set. |
TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPAndSendReport) { |
GURL report_uri(kHPKPReportUri); |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
- |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
// Set up a pin for |test_server_hostname|. |
TransportSecurityState security_state; |
@@ -5764,7 +5788,7 @@ TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPAndSendReport) { |
// Now send a request to trigger the violation. |
TestDelegate d; |
scoped_ptr<URLRequest> violating_request(context.CreateRequest( |
- https_test_server.GetURL("files/simple.html"), DEFAULT_PRIORITY, &d)); |
+ https_test_server.GetURL("/simple.html"), DEFAULT_PRIORITY, &d)); |
violating_request->Start(); |
base::RunLoop().Run(); |
@@ -5786,15 +5810,14 @@ TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPAndSendReport) { |
// Public-Key-Pins-Report-Only headers. |
TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPReportOnly) { |
GURL report_uri(kHPKPReportUri); |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
- |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TransportSecurityState security_state; |
MockCertificateReportSender mock_report_sender; |
@@ -5827,7 +5850,7 @@ TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPReportOnly) { |
// Now send a request to trigger the violation. |
TestDelegate d; |
scoped_ptr<URLRequest> violating_request(context.CreateRequest( |
- https_test_server.GetURL("files/hpkp-headers-report-only.html"), |
+ https_test_server.GetURL("/hpkp-headers-report-only.html"), |
DEFAULT_PRIORITY, &d)); |
violating_request->Start(); |
base::RunLoop().Run(); |
@@ -5850,15 +5873,14 @@ TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPReportOnly) { |
// Public-Key-Pins-Report-Only headers that don't have pin violations. |
TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPReportOnlyWithNoViolation) { |
GURL report_uri(kHPKPReportUri); |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
- |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TransportSecurityState security_state; |
MockCertificateReportSender mock_report_sender; |
@@ -5876,7 +5898,7 @@ TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPReportOnlyWithNoViolation) { |
// Now send a request that does not trigger the violation. |
TestDelegate d; |
scoped_ptr<URLRequest> request(context.CreateRequest( |
- https_test_server.GetURL("files/hpkp-headers-report-only.html"), |
+ https_test_server.GetURL("/hpkp-headers-report-only.html"), |
DEFAULT_PRIORITY, &d)); |
request->Start(); |
base::RunLoop().Run(); |
@@ -5887,19 +5909,18 @@ TEST_F(URLRequestTestHTTP, MAYBE_ProcessPKPReportOnlyWithNoViolation) { |
} |
TEST_F(URLRequestTestHTTP, PKPNotProcessedOnIP) { |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- SpawnedTestServer::SSLOptions(), |
- base::FilePath(kTestFilePath)); |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
// Make sure this test fails if the test server is changed to not |
// listen on an IP by default. |
- ASSERT_TRUE(https_test_server.GetURL("").HostIsIPAddress()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ ASSERT_TRUE(https_test_server.GetURL("/").HostIsIPAddress()); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TestDelegate d; |
scoped_ptr<URLRequest> request(default_context_.CreateRequest( |
- https_test_server.GetURL("files/hpkp-headers.html"), DEFAULT_PRIORITY, |
- &d)); |
+ https_test_server.GetURL("/hpkp-headers.html"), DEFAULT_PRIORITY, &d)); |
request->Start(); |
base::RunLoop().Run(); |
@@ -5911,19 +5932,19 @@ TEST_F(URLRequestTestHTTP, PKPNotProcessedOnIP) { |
} |
TEST_F(URLRequestTestHTTP, ProcessSTSOnce) { |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TestDelegate d; |
scoped_ptr<URLRequest> request(default_context_.CreateRequest( |
- https_test_server.GetURL("files/hsts-multiple-headers.html"), |
- DEFAULT_PRIORITY, &d)); |
+ https_test_server.GetURL("/hsts-multiple-headers.html"), DEFAULT_PRIORITY, |
+ &d)); |
request->Start(); |
base::RunLoop().Run(); |
@@ -5940,19 +5961,19 @@ TEST_F(URLRequestTestHTTP, ProcessSTSOnce) { |
} |
TEST_F(URLRequestTestHTTP, ProcessSTSAndPKP) { |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TestDelegate d; |
scoped_ptr<URLRequest> request(default_context_.CreateRequest( |
- https_test_server.GetURL("files/hsts-and-hpkp-headers.html"), |
- DEFAULT_PRIORITY, &d)); |
+ https_test_server.GetURL("/hsts-and-hpkp-headers.html"), DEFAULT_PRIORITY, |
+ &d)); |
request->Start(); |
base::RunLoop().Run(); |
@@ -5984,18 +6005,18 @@ TEST_F(URLRequestTestHTTP, ProcessSTSAndPKP) { |
// Tests that when multiple HPKP headers are present, asserting different |
// policies, that only the first such policy is processed. |
TEST_F(URLRequestTestHTTP, ProcessSTSAndPKP2) { |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_COMMON_NAME_IS_DOMAIN); |
- SpawnedTestServer https_test_server(SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(kTestFilePath)); |
+ EmbeddedTestServer https_test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_COMMON_NAME_IS_DOMAIN); |
+ https_test_server.ServeFilesFromSourceDirectory( |
+ base::FilePath(kTestFilePath)); |
ASSERT_TRUE(https_test_server.Start()); |
- std::string test_server_hostname = https_test_server.GetURL("").host(); |
+ std::string test_server_hostname = https_test_server.GetURL("/").host(); |
TestDelegate d; |
scoped_ptr<URLRequest> request(default_context_.CreateRequest( |
- https_test_server.GetURL("files/hsts-and-hpkp-headers2.html"), |
+ https_test_server.GetURL("/hsts-and-hpkp-headers2.html"), |
DEFAULT_PRIORITY, &d)); |
request->Start(); |
base::RunLoop().Run(); |
@@ -6021,12 +6042,14 @@ TEST_F(URLRequestTestHTTP, ProcessSTSAndPKP2) { |
EXPECT_FALSE(pkp_state.include_subdomains); |
} |
+#endif // !defined(OS_IOS) |
+ |
TEST_F(URLRequestTestHTTP, ContentTypeNormalizationTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/content-type-normalization.html"), |
+ http_test_server()->GetURL("/content-type-normalization.html"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6064,11 +6087,11 @@ TEST_F(URLRequestTestHTTP, ProtocolHandlerAndFactoryRestrictFileRedirects) { |
} |
TEST_F(URLRequestTestHTTP, RestrictFileRedirects) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/redirect-to-file.html"), DEFAULT_PRIORITY, |
+ http_test_server()->GetURL("/redirect-to-file.html"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6079,11 +6102,11 @@ TEST_F(URLRequestTestHTTP, RestrictFileRedirects) { |
#endif // !defined(DISABLE_FILE_SUPPORT) |
TEST_F(URLRequestTestHTTP, RestrictDataRedirects) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/redirect-to-data.html"), DEFAULT_PRIORITY, |
+ http_test_server()->GetURL("/redirect-to-data.html"), DEFAULT_PRIORITY, |
&d)); |
req->Start(); |
base::MessageLoop::current()->Run(); |
@@ -6093,11 +6116,11 @@ TEST_F(URLRequestTestHTTP, RestrictDataRedirects) { |
} |
TEST_F(URLRequestTestHTTP, RedirectToInvalidURL) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/redirect-to-invalid-url.html"), |
+ http_test_server()->GetURL("/redirect-to-invalid-url.html"), |
DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6108,9 +6131,9 @@ TEST_F(URLRequestTestHTTP, RedirectToInvalidURL) { |
// Make sure redirects are cached, despite not reading their bodies. |
TEST_F(URLRequestTestHTTP, CacheRedirect) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
GURL redirect_url = |
- test_server_.GetURL("files/redirect302-to-echo-cacheable"); |
+ http_test_server()->GetURL("/redirect302-to-echo-cacheable"); |
{ |
TestDelegate d; |
@@ -6120,7 +6143,7 @@ TEST_F(URLRequestTestHTTP, CacheRedirect) { |
base::RunLoop().Run(); |
EXPECT_EQ(URLRequestStatus::SUCCESS, req->status().status()); |
EXPECT_EQ(1, d.received_redirect_count()); |
- EXPECT_EQ(test_server_.GetURL("echo"), req->url()); |
+ EXPECT_EQ(http_test_server()->GetURL("/echo"), req->url()); |
} |
{ |
@@ -6140,20 +6163,20 @@ TEST_F(URLRequestTestHTTP, CacheRedirect) { |
EXPECT_EQ(1, d.received_redirect_count()); |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_EQ(URLRequestStatus::SUCCESS, req->status().status()); |
- EXPECT_EQ(test_server_.GetURL("echo"), req->url()); |
+ EXPECT_EQ(http_test_server()->GetURL("/echo"), req->url()); |
} |
} |
// Make sure a request isn't cached when a NetworkDelegate forces a redirect |
// when the headers are read, since the body won't have been read. |
TEST_F(URLRequestTestHTTP, NoCacheOnNetworkDelegateRedirect) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
// URL that is normally cached. |
- GURL initial_url = test_server_.GetURL("cachetime"); |
+ GURL initial_url = http_test_server()->GetURL("/cachetime"); |
{ |
// Set up the TestNetworkDelegate tp force a redirect. |
- GURL redirect_to_url = test_server_.GetURL("echo"); |
+ GURL redirect_to_url = http_test_server()->GetURL("/echo"); |
default_network_delegate_.set_redirect_on_headers_received_url( |
redirect_to_url); |
@@ -6184,7 +6207,7 @@ TEST_F(URLRequestTestHTTP, NoCacheOnNetworkDelegateRedirect) { |
// Tests that redirection to an unsafe URL is allowed when it has been marked as |
// safe. |
TEST_F(URLRequestTestHTTP, UnsafeRedirectToWhitelistedUnsafeURL) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
GURL unsafe_url("data:text/html,this-is-considered-an-unsafe-url"); |
default_network_delegate_.set_redirect_on_headers_received_url(unsafe_url); |
@@ -6193,7 +6216,7 @@ TEST_F(URLRequestTestHTTP, UnsafeRedirectToWhitelistedUnsafeURL) { |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("whatever"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/whatever"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -6210,7 +6233,7 @@ TEST_F(URLRequestTestHTTP, UnsafeRedirectToWhitelistedUnsafeURL) { |
// Tests that a redirect to a different unsafe URL is blocked, even after adding |
// some other URL to the whitelist. |
TEST_F(URLRequestTestHTTP, UnsafeRedirectToDifferentUnsafeURL) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
GURL unsafe_url("data:text/html,something"); |
GURL different_unsafe_url("data:text/html,something-else"); |
@@ -6221,7 +6244,7 @@ TEST_F(URLRequestTestHTTP, UnsafeRedirectToDifferentUnsafeURL) { |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("whatever"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/whatever"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -6234,9 +6257,9 @@ TEST_F(URLRequestTestHTTP, UnsafeRedirectToDifferentUnsafeURL) { |
// Redirects from an URL with fragment to an unsafe URL with fragment should |
// be allowed, and the reference fragment of the target URL should be preserved. |
TEST_F(URLRequestTestHTTP, UnsafeRedirectWithDifferentReferenceFragment) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL original_url(test_server_.GetURL("original#fragment1")); |
+ GURL original_url(http_test_server()->GetURL("/original#fragment1")); |
GURL unsafe_url("data:,url-marked-safe-and-used-in-redirect#fragment2"); |
GURL expected_url("data:,url-marked-safe-and-used-in-redirect#fragment2"); |
@@ -6262,12 +6285,13 @@ TEST_F(URLRequestTestHTTP, UnsafeRedirectWithDifferentReferenceFragment) { |
// When a delegate has specified a safe redirect URL, but it does not match the |
// redirect target, then do not prevent the reference fragment from being added. |
TEST_F(URLRequestTestHTTP, RedirectWithReferenceFragmentAndUnrelatedUnsafeUrl) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL original_url(test_server_.GetURL("original#expected-fragment")); |
+ GURL original_url(http_test_server()->GetURL("/original#expected-fragment")); |
GURL unsafe_url("data:text/html,this-url-does-not-match-redirect-url"); |
- GURL redirect_url(test_server_.GetURL("target")); |
- GURL expected_redirect_url(test_server_.GetURL("target#expected-fragment")); |
+ GURL redirect_url(http_test_server()->GetURL("/target")); |
+ GURL expected_redirect_url( |
+ http_test_server()->GetURL("/target#expected-fragment")); |
default_network_delegate_.set_redirect_on_headers_received_url(redirect_url); |
default_network_delegate_.set_allowed_unsafe_redirect_url(unsafe_url); |
@@ -6292,9 +6316,10 @@ TEST_F(URLRequestTestHTTP, RedirectWithReferenceFragmentAndUnrelatedUnsafeUrl) { |
// URL should not be changed. In particular, the reference fragment should not |
// be modified. |
TEST_F(URLRequestTestHTTP, RedirectWithReferenceFragment) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL original_url(test_server_.GetURL("original#should-not-be-appended")); |
+ GURL original_url( |
+ http_test_server()->GetURL("/original#should-not-be-appended")); |
GURL redirect_url("data:text/html,expect-no-reference-fragment"); |
default_network_delegate_.set_redirect_on_headers_received_url(redirect_url); |
@@ -6319,10 +6344,11 @@ TEST_F(URLRequestTestHTTP, RedirectWithReferenceFragment) { |
// When a URLRequestRedirectJob is created, the redirection must be followed and |
// the reference fragment of the target URL must not be modified. |
TEST_F(URLRequestTestHTTP, RedirectJobWithReferenceFragment) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL original_url(test_server_.GetURL("original#should-not-be-appended")); |
- GURL redirect_url(test_server_.GetURL("echo")); |
+ GURL original_url( |
+ http_test_server()->GetURL("/original#should-not-be-appended")); |
+ GURL redirect_url(http_test_server()->GetURL("/echo")); |
TestDelegate d; |
scoped_ptr<URLRequest> r( |
@@ -6343,11 +6369,11 @@ TEST_F(URLRequestTestHTTP, RedirectJobWithReferenceFragment) { |
} |
TEST_F(URLRequestTestHTTP, NoUserPassInReferrer) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
req->SetReferrer("http://user:pass@foo.com/"); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6356,11 +6382,11 @@ TEST_F(URLRequestTestHTTP, NoUserPassInReferrer) { |
} |
TEST_F(URLRequestTestHTTP, NoFragmentInReferrer) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
req->SetReferrer("http://foo.com/test#fragment"); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6369,11 +6395,11 @@ TEST_F(URLRequestTestHTTP, NoFragmentInReferrer) { |
} |
TEST_F(URLRequestTestHTTP, EmptyReferrerAfterValidReferrer) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Referer"), DEFAULT_PRIORITY, &d)); |
req->SetReferrer("http://foo.com/test#fragment"); |
req->SetReferrer(""); |
req->Start(); |
@@ -6385,12 +6411,12 @@ TEST_F(URLRequestTestHTTP, EmptyReferrerAfterValidReferrer) { |
// Defer network start and then resume, checking that the request was a success |
// and bytes were received. |
TEST_F(URLRequestTestHTTP, DeferredBeforeNetworkStart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
d.set_quit_on_network_start(true); |
- GURL test_url(test_server_.GetURL("echo")); |
+ GURL test_url(http_test_server()->GetURL("/echo")); |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(test_url, DEFAULT_PRIORITY, &d)); |
@@ -6412,14 +6438,15 @@ TEST_F(URLRequestTestHTTP, DeferredBeforeNetworkStart) { |
// Check that OnBeforeNetworkStart is only called once even if there is a |
// redirect. |
TEST_F(URLRequestTestHTTP, BeforeNetworkStartCalledOnce) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
d.set_quit_on_redirect(true); |
d.set_quit_on_network_start(true); |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("server-redirect?echo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/server-redirect?echo"), DEFAULT_PRIORITY, |
+ &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6447,12 +6474,12 @@ TEST_F(URLRequestTestHTTP, BeforeNetworkStartCalledOnce) { |
// Cancel the request after learning that the request would use the network. |
TEST_F(URLRequestTestHTTP, CancelOnBeforeNetworkStart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
d.set_quit_on_network_start(true); |
- GURL test_url(test_server_.GetURL("echo")); |
+ GURL test_url(http_test_server()->GetURL("/echo")); |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(test_url, DEFAULT_PRIORITY, &d)); |
@@ -6472,13 +6499,14 @@ TEST_F(URLRequestTestHTTP, CancelOnBeforeNetworkStart) { |
} |
TEST_F(URLRequestTestHTTP, CancelRedirect) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
d.set_cancel_in_received_redirect(true); |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/redirect-test.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/redirect-test.html"), DEFAULT_PRIORITY, |
+ &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6490,12 +6518,12 @@ TEST_F(URLRequestTestHTTP, CancelRedirect) { |
} |
TEST_F(URLRequestTestHTTP, DeferredRedirect) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
d.set_quit_on_redirect(true); |
- GURL test_url(test_server_.GetURL("files/redirect-test.html")); |
+ GURL test_url(http_test_server()->GetURL("/redirect-test.html")); |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(test_url, DEFAULT_PRIORITY, &d)); |
@@ -6523,12 +6551,12 @@ TEST_F(URLRequestTestHTTP, DeferredRedirect) { |
} |
TEST_F(URLRequestTestHTTP, DeferredRedirect_GetFullRequestHeaders) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
d.set_quit_on_redirect(true); |
- GURL test_url(test_server_.GetURL("files/redirect-test.html")); |
+ GURL test_url(http_test_server()->GetURL("/redirect-test.html")); |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(test_url, DEFAULT_PRIORITY, &d)); |
@@ -6545,7 +6573,7 @@ TEST_F(URLRequestTestHTTP, DeferredRedirect_GetFullRequestHeaders) { |
req->FollowDeferredRedirect(); |
base::RunLoop().Run(); |
- GURL target_url(test_server_.GetURL("files/with-headers.html")); |
+ GURL target_url(http_test_server()->GetURL("/with-headers.html")); |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_TRUE(d.have_full_request_headers()); |
CheckFullRequestHeaders(d.full_request_headers(), target_url); |
@@ -6564,13 +6592,14 @@ TEST_F(URLRequestTestHTTP, DeferredRedirect_GetFullRequestHeaders) { |
} |
TEST_F(URLRequestTestHTTP, CancelDeferredRedirect) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
{ |
d.set_quit_on_redirect(true); |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/redirect-test.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/redirect-test.html"), DEFAULT_PRIORITY, |
+ &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -6587,13 +6616,14 @@ TEST_F(URLRequestTestHTTP, CancelDeferredRedirect) { |
} |
TEST_F(URLRequestTestHTTP, VaryHeader) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
// Populate the cache. |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheadercache?foo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheadercache?foo"), DEFAULT_PRIORITY, |
+ &d)); |
HttpRequestHeaders headers; |
headers.SetHeader("foo", "1"); |
req->SetExtraRequestHeaders(headers); |
@@ -6609,7 +6639,8 @@ TEST_F(URLRequestTestHTTP, VaryHeader) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheadercache?foo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheadercache?foo"), DEFAULT_PRIORITY, |
+ &d)); |
HttpRequestHeaders headers; |
headers.SetHeader("foo", "1"); |
req->SetExtraRequestHeaders(headers); |
@@ -6627,7 +6658,8 @@ TEST_F(URLRequestTestHTTP, VaryHeader) { |
{ |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheadercache?foo"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheadercache?foo"), DEFAULT_PRIORITY, |
+ &d)); |
HttpRequestHeaders headers; |
headers.SetHeader("foo", "2"); |
req->SetExtraRequestHeaders(headers); |
@@ -6643,7 +6675,7 @@ TEST_F(URLRequestTestHTTP, VaryHeader) { |
} |
TEST_F(URLRequestTestHTTP, BasicAuth) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
// populate the cache |
{ |
@@ -6651,7 +6683,7 @@ TEST_F(URLRequestTestHTTP, BasicAuth) { |
d.set_credentials(AuthCredentials(kUser, kSecret)); |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("auth-basic"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/auth-basic"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -6667,7 +6699,7 @@ TEST_F(URLRequestTestHTTP, BasicAuth) { |
d.set_credentials(AuthCredentials(kUser, kSecret)); |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("auth-basic"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/auth-basic"), DEFAULT_PRIORITY, &d)); |
r->SetLoadFlags(LOAD_VALIDATE_CACHE); |
r->Start(); |
@@ -6683,10 +6715,10 @@ TEST_F(URLRequestTestHTTP, BasicAuth) { |
// Check that Set-Cookie headers in 401 responses are respected. |
// http://crbug.com/6450 |
TEST_F(URLRequestTestHTTP, BasicAuthWithCookies) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
GURL url_requiring_auth = |
- test_server_.GetURL("auth-basic?set-cookie-if-challenged"); |
+ http_test_server()->GetURL("/auth-basic?set-cookie-if-challenged"); |
// Request a page that will give a 401 containing a Set-Cookie header. |
// Verify that when the transaction is restarted, it includes the new cookie. |
@@ -6743,7 +6775,7 @@ TEST_F(URLRequestTestHTTP, BasicAuthWithCookies) { |
// Tests that load timing works as expected with auth and the cache. |
TEST_F(URLRequestTestHTTP, BasicAuthLoadTiming) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
// populate the cache |
{ |
@@ -6751,7 +6783,7 @@ TEST_F(URLRequestTestHTTP, BasicAuthLoadTiming) { |
d.set_credentials(AuthCredentials(kUser, kSecret)); |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("auth-basic"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/auth-basic"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -6783,7 +6815,7 @@ TEST_F(URLRequestTestHTTP, BasicAuthLoadTiming) { |
d.set_credentials(AuthCredentials(kUser, kSecret)); |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("auth-basic"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/auth-basic"), DEFAULT_PRIORITY, &d)); |
r->SetLoadFlags(LOAD_VALIDATE_CACHE); |
r->Start(); |
@@ -6807,13 +6839,14 @@ TEST_F(URLRequestTestHTTP, BasicAuthLoadTiming) { |
// Content-Type header. |
// http://code.google.com/p/chromium/issues/detail?id=843 |
TEST_F(URLRequestTestHTTP, Post302RedirectGet) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
const char kData[] = "hello world"; |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("files/redirect-to-echoall"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/redirect-to-echoall"), DEFAULT_PRIORITY, |
+ &d)); |
req->set_method("POST"); |
req->set_upload(CreateSimpleUploadData(kData)); |
@@ -6855,11 +6888,11 @@ TEST_F(URLRequestTestHTTP, Post302RedirectGet) { |
// https://crbug.com/465517. |
TEST_F(URLRequestTestHTTP, Redirect301Tests) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- const GURL url = test_server_.GetURL("files/redirect301-to-echo"); |
+ const GURL url = http_test_server()->GetURL("/redirect301-to-echo"); |
const GURL https_redirect_url = |
- test_server_.GetURL("files/redirect301-to-https"); |
+ http_test_server()->GetURL("/redirect301-to-https"); |
HTTPRedirectMethodTest(url, "POST", "GET", true); |
HTTPRedirectMethodTest(url, "PUT", "PUT", true); |
@@ -6873,11 +6906,11 @@ TEST_F(URLRequestTestHTTP, Redirect301Tests) { |
} |
TEST_F(URLRequestTestHTTP, Redirect302Tests) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- const GURL url = test_server_.GetURL("files/redirect302-to-echo"); |
+ const GURL url = http_test_server()->GetURL("/redirect302-to-echo"); |
const GURL https_redirect_url = |
- test_server_.GetURL("files/redirect302-to-https"); |
+ http_test_server()->GetURL("/redirect302-to-https"); |
HTTPRedirectMethodTest(url, "POST", "GET", true); |
HTTPRedirectMethodTest(url, "PUT", "PUT", true); |
@@ -6891,11 +6924,11 @@ TEST_F(URLRequestTestHTTP, Redirect302Tests) { |
} |
TEST_F(URLRequestTestHTTP, Redirect303Tests) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- const GURL url = test_server_.GetURL("files/redirect303-to-echo"); |
+ const GURL url = http_test_server()->GetURL("/redirect303-to-echo"); |
const GURL https_redirect_url = |
- test_server_.GetURL("files/redirect303-to-https"); |
+ http_test_server()->GetURL("/redirect303-to-https"); |
HTTPRedirectMethodTest(url, "POST", "GET", true); |
HTTPRedirectMethodTest(url, "PUT", "GET", true); |
@@ -6909,11 +6942,11 @@ TEST_F(URLRequestTestHTTP, Redirect303Tests) { |
} |
TEST_F(URLRequestTestHTTP, Redirect307Tests) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- const GURL url = test_server_.GetURL("files/redirect307-to-echo"); |
+ const GURL url = http_test_server()->GetURL("/redirect307-to-echo"); |
const GURL https_redirect_url = |
- test_server_.GetURL("files/redirect307-to-https"); |
+ http_test_server()->GetURL("/redirect307-to-https"); |
HTTPRedirectMethodTest(url, "POST", "POST", true); |
HTTPRedirectMethodTest(url, "PUT", "PUT", true); |
@@ -6926,11 +6959,11 @@ TEST_F(URLRequestTestHTTP, Redirect307Tests) { |
} |
TEST_F(URLRequestTestHTTP, Redirect308Tests) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- const GURL url = test_server_.GetURL("files/redirect308-to-echo"); |
+ const GURL url = http_test_server()->GetURL("/redirect308-to-echo"); |
const GURL https_redirect_url = |
- test_server_.GetURL("files/redirect308-to-https"); |
+ http_test_server()->GetURL("/redirect308-to-https"); |
HTTPRedirectMethodTest(url, "POST", "POST", true); |
HTTPRedirectMethodTest(url, "PUT", "PUT", true); |
@@ -6946,10 +6979,10 @@ TEST_F(URLRequestTestHTTP, Redirect308Tests) { |
// Certain legacy apis that pre-date the response code expect this behavior |
// (Like Google Drive). |
TEST_F(URLRequestTestHTTP, NoRedirectOn308WithoutLocationHeader) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
- const GURL url = test_server_.GetURL("files/308-without-location-header"); |
+ const GURL url = http_test_server()->GetURL("/308-without-location-header"); |
scoped_ptr<URLRequest> request( |
default_context_.CreateRequest(url, DEFAULT_PRIORITY, &d)); |
@@ -6964,10 +6997,11 @@ TEST_F(URLRequestTestHTTP, NoRedirectOn308WithoutLocationHeader) { |
} |
TEST_F(URLRequestTestHTTP, Redirect302PreserveReferenceFragment) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL original_url(test_server_.GetURL("files/redirect302-to-echo#fragment")); |
- GURL expected_url(test_server_.GetURL("echo#fragment")); |
+ GURL original_url( |
+ http_test_server()->GetURL("/redirect302-to-echo#fragment")); |
+ GURL expected_url(http_test_server()->GetURL("/echo#fragment")); |
TestDelegate d; |
{ |
@@ -6986,9 +7020,9 @@ TEST_F(URLRequestTestHTTP, Redirect302PreserveReferenceFragment) { |
} |
TEST_F(URLRequestTestHTTP, RedirectPreserveFirstPartyURL) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL url(test_server_.GetURL("files/redirect302-to-echo")); |
+ GURL url(http_test_server()->GetURL("/redirect302-to-echo")); |
GURL first_party_url("http://example.com"); |
TestDelegate d; |
@@ -7008,11 +7042,11 @@ TEST_F(URLRequestTestHTTP, RedirectPreserveFirstPartyURL) { |
} |
TEST_F(URLRequestTestHTTP, RedirectUpdateFirstPartyURL) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
- GURL url(test_server_.GetURL("files/redirect302-to-echo")); |
+ GURL url(http_test_server()->GetURL("/redirect302-to-echo")); |
GURL original_first_party_url("http://example.com"); |
- GURL expected_first_party_url(test_server_.GetURL("echo")); |
+ GURL expected_first_party_url(http_test_server()->GetURL("/echo")); |
TestDelegate d; |
{ |
@@ -7033,13 +7067,13 @@ TEST_F(URLRequestTestHTTP, RedirectUpdateFirstPartyURL) { |
} |
TEST_F(URLRequestTestHTTP, InterceptPost302RedirectGet) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
const char kData[] = "hello world"; |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("empty.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
req->set_method("POST"); |
req->set_upload(CreateSimpleUploadData(kData)); |
HttpRequestHeaders headers; |
@@ -7048,7 +7082,8 @@ TEST_F(URLRequestTestHTTP, InterceptPost302RedirectGet) { |
req->SetExtraRequestHeaders(headers); |
URLRequestRedirectJob* job = new URLRequestRedirectJob( |
- req.get(), &default_network_delegate_, test_server_.GetURL("echo"), |
+ req.get(), &default_network_delegate_, |
+ http_test_server()->GetURL("/echo"), |
URLRequestRedirectJob::REDIRECT_302_FOUND, "Very Good Reason"); |
AddTestInterceptor()->set_main_intercept_job(job); |
@@ -7058,13 +7093,13 @@ TEST_F(URLRequestTestHTTP, InterceptPost302RedirectGet) { |
} |
TEST_F(URLRequestTestHTTP, InterceptPost307RedirectPost) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
const char kData[] = "hello world"; |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("empty.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
req->set_method("POST"); |
req->set_upload(CreateSimpleUploadData(kData)); |
HttpRequestHeaders headers; |
@@ -7073,7 +7108,8 @@ TEST_F(URLRequestTestHTTP, InterceptPost307RedirectPost) { |
req->SetExtraRequestHeaders(headers); |
URLRequestRedirectJob* job = new URLRequestRedirectJob( |
- req.get(), &default_network_delegate_, test_server_.GetURL("echo"), |
+ req.get(), &default_network_delegate_, |
+ http_test_server()->GetURL("/echo"), |
URLRequestRedirectJob::REDIRECT_307_TEMPORARY_REDIRECT, |
"Very Good Reason"); |
AddTestInterceptor()->set_main_intercept_job(job); |
@@ -7086,7 +7122,7 @@ TEST_F(URLRequestTestHTTP, InterceptPost307RedirectPost) { |
// Check that default A-L header is sent. |
TEST_F(URLRequestTestHTTP, DefaultAcceptLanguage) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
StaticHttpUserAgentSettings settings("en", std::string()); |
TestNetworkDelegate network_delegate; // Must outlive URLRequests. |
@@ -7097,7 +7133,8 @@ TEST_F(URLRequestTestHTTP, DefaultAcceptLanguage) { |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server_.GetURL("echoheader?Accept-Language"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Accept-Language"), |
+ DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
EXPECT_EQ("en", d.data_received()); |
@@ -7105,7 +7142,7 @@ TEST_F(URLRequestTestHTTP, DefaultAcceptLanguage) { |
// Check that an empty A-L header is not sent. http://crbug.com/77365. |
TEST_F(URLRequestTestHTTP, EmptyAcceptLanguage) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
std::string empty_string; // Avoid most vexing parse on line below. |
StaticHttpUserAgentSettings settings(empty_string, empty_string); |
@@ -7119,7 +7156,8 @@ TEST_F(URLRequestTestHTTP, EmptyAcceptLanguage) { |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server_.GetURL("echoheader?Accept-Language"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Accept-Language"), |
+ DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
EXPECT_EQ("None", d.data_received()); |
@@ -7128,11 +7166,12 @@ TEST_F(URLRequestTestHTTP, EmptyAcceptLanguage) { |
// Check that if request overrides the A-L header, the default is not appended. |
// See http://crbug.com/20894 |
TEST_F(URLRequestTestHTTP, OverrideAcceptLanguage) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?Accept-Language"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Accept-Language"), |
+ DEFAULT_PRIORITY, &d)); |
HttpRequestHeaders headers; |
headers.SetHeader(HttpRequestHeaders::kAcceptLanguage, "ru"); |
req->SetExtraRequestHeaders(headers); |
@@ -7143,11 +7182,12 @@ TEST_F(URLRequestTestHTTP, OverrideAcceptLanguage) { |
// Check that default A-E header is sent. |
TEST_F(URLRequestTestHTTP, DefaultAcceptEncoding) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?Accept-Encoding"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Accept-Encoding"), |
+ DEFAULT_PRIORITY, &d)); |
HttpRequestHeaders headers; |
req->SetExtraRequestHeaders(headers); |
req->Start(); |
@@ -7158,11 +7198,12 @@ TEST_F(URLRequestTestHTTP, DefaultAcceptEncoding) { |
// Check that if request overrides the A-E header, the default is not appended. |
// See http://crbug.com/47381 |
TEST_F(URLRequestTestHTTP, OverrideAcceptEncoding) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?Accept-Encoding"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Accept-Encoding"), |
+ DEFAULT_PRIORITY, &d)); |
HttpRequestHeaders headers; |
headers.SetHeader(HttpRequestHeaders::kAcceptEncoding, "identity"); |
req->SetExtraRequestHeaders(headers); |
@@ -7174,11 +7215,12 @@ TEST_F(URLRequestTestHTTP, OverrideAcceptEncoding) { |
// Check that setting the A-C header sends the proper header. |
TEST_F(URLRequestTestHTTP, SetAcceptCharset) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?Accept-Charset"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?Accept-Charset"), |
+ DEFAULT_PRIORITY, &d)); |
HttpRequestHeaders headers; |
headers.SetHeader(HttpRequestHeaders::kAcceptCharset, "koi-8r"); |
req->SetExtraRequestHeaders(headers); |
@@ -7189,11 +7231,12 @@ TEST_F(URLRequestTestHTTP, SetAcceptCharset) { |
// Check that default User-Agent header is sent. |
TEST_F(URLRequestTestHTTP, DefaultUserAgent) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?User-Agent"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?User-Agent"), DEFAULT_PRIORITY, |
+ &d)); |
req->Start(); |
base::RunLoop().Run(); |
EXPECT_EQ(default_context_.http_user_agent_settings()->GetUserAgent(), |
@@ -7203,11 +7246,12 @@ TEST_F(URLRequestTestHTTP, DefaultUserAgent) { |
// Check that if request overrides the User-Agent header, |
// the default is not appended. |
TEST_F(URLRequestTestHTTP, OverrideUserAgent) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("echoheader?User-Agent"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/echoheader?User-Agent"), DEFAULT_PRIORITY, |
+ &d)); |
HttpRequestHeaders headers; |
headers.SetHeader(HttpRequestHeaders::kUserAgent, "Lynx (textmode)"); |
req->SetExtraRequestHeaders(headers); |
@@ -7220,7 +7264,7 @@ TEST_F(URLRequestTestHTTP, OverrideUserAgent) { |
// User-Agent header to be sent but does not send the Accept-Language and |
// Accept-Charset headers. |
TEST_F(URLRequestTestHTTP, EmptyHttpUserAgentSettings) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestNetworkDelegate network_delegate; // Must outlive URLRequests. |
TestURLRequestContext context(true); |
@@ -7233,14 +7277,14 @@ TEST_F(URLRequestTestHTTP, EmptyHttpUserAgentSettings) { |
struct { |
const char* request; |
const char* expected_response; |
- } tests[] = { { "echoheader?Accept-Language", "None" }, |
- { "echoheader?Accept-Charset", "None" }, |
- { "echoheader?User-Agent", "" } }; |
+ } tests[] = {{"/echoheader?Accept-Language", "None"}, |
+ {"/echoheader?Accept-Charset", "None"}, |
+ {"/echoheader?User-Agent", ""}}; |
for (size_t i = 0; i < arraysize(tests); i++) { |
TestDelegate d; |
scoped_ptr<URLRequest> req(context.CreateRequest( |
- test_server_.GetURL(tests[i].request), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL(tests[i].request), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
EXPECT_EQ(tests[i].expected_response, d.data_received()) |
@@ -7251,17 +7295,17 @@ TEST_F(URLRequestTestHTTP, EmptyHttpUserAgentSettings) { |
// Make sure that URLRequest passes on its priority updates to |
// newly-created jobs after the first one. |
TEST_F(URLRequestTestHTTP, SetSubsequentJobPriority) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("empty.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
EXPECT_EQ(DEFAULT_PRIORITY, req->priority()); |
- scoped_refptr<URLRequestRedirectJob> redirect_job = |
- new URLRequestRedirectJob( |
- req.get(), &default_network_delegate_, test_server_.GetURL("echo"), |
- URLRequestRedirectJob::REDIRECT_302_FOUND, "Very Good Reason"); |
+ scoped_refptr<URLRequestRedirectJob> redirect_job = new URLRequestRedirectJob( |
+ req.get(), &default_network_delegate_, |
+ http_test_server()->GetURL("/echo"), |
+ URLRequestRedirectJob::REDIRECT_302_FOUND, "Very Good Reason"); |
AddTestInterceptor()->set_main_intercept_job(redirect_job.get()); |
req->SetPriority(LOW); |
@@ -7350,10 +7394,10 @@ TEST_F(URLRequestTestHTTP, NetworkSuspendTestNoCache) { |
} |
TEST_F(URLRequestTestHTTP, NetworkAccessedSetOnNetworkRequest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
- GURL test_url(test_server_.GetURL(std::string())); |
+ GURL test_url(http_test_server()->GetURL("/")); |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(test_url, DEFAULT_PRIORITY, &d)); |
@@ -7364,12 +7408,12 @@ TEST_F(URLRequestTestHTTP, NetworkAccessedSetOnNetworkRequest) { |
} |
TEST_F(URLRequestTestHTTP, NetworkAccessedClearOnCachedResponse) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
// Populate the cache. |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context_.CreateRequest( |
- test_server_.GetURL("cachetime"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/cachetime"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -7377,7 +7421,7 @@ TEST_F(URLRequestTestHTTP, NetworkAccessedClearOnCachedResponse) { |
EXPECT_TRUE(req->response_info().network_accessed); |
EXPECT_FALSE(req->response_info().was_cached); |
- req = default_context_.CreateRequest(test_server_.GetURL("cachetime"), |
+ req = default_context_.CreateRequest(http_test_server()->GetURL("/cachetime"), |
DEFAULT_PRIORITY, &d); |
req->Start(); |
base::RunLoop().Run(); |
@@ -7388,10 +7432,10 @@ TEST_F(URLRequestTestHTTP, NetworkAccessedClearOnCachedResponse) { |
} |
TEST_F(URLRequestTestHTTP, NetworkAccessedClearOnLoadOnlyFromCache) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
- GURL test_url(test_server_.GetURL(std::string())); |
+ GURL test_url(http_test_server()->GetURL("/")); |
scoped_ptr<URLRequest> req( |
default_context_.CreateRequest(test_url, DEFAULT_PRIORITY, &d)); |
req->SetLoadFlags(LOAD_ONLY_FROM_CACHE); |
@@ -7430,11 +7474,11 @@ TEST_F(URLRequestInterceptorTestHTTP, |
interceptor()->set_redirect_headers(MockURLRequestInterceptor::ok_headers()); |
interceptor()->set_redirect_data(MockURLRequestInterceptor::ok_data()); |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context().CreateRequest( |
- test_server()->GetURL("files/redirect-test.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/redirect-test.html"), DEFAULT_PRIORITY, &d)); |
req->Start(); |
base::RunLoop().Run(); |
@@ -7461,11 +7505,11 @@ TEST_F(URLRequestInterceptorTestHTTP, |
interceptor()->set_final_data(MockURLRequestInterceptor::ok_data()); |
default_network_delegate()->set_can_be_intercepted_on_error(true); |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context().CreateRequest( |
- test_server()->GetURL("files/two-content-lengths.html"), DEFAULT_PRIORITY, |
+ http_test_server()->GetURL("/two-content-lengths.html"), DEFAULT_PRIORITY, |
&d)); |
req->set_method("GET"); |
req->Start(); |
@@ -7494,11 +7538,11 @@ TEST_F(URLRequestInterceptorTestHTTP, |
// Intercept with a real URLRequestHttpJob. |
interceptor()->set_use_url_request_http_job(true); |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(http_test_server()->Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> req(default_context().CreateRequest( |
- test_server()->GetURL("files/simple.html"), DEFAULT_PRIORITY, &d)); |
+ http_test_server()->GetURL("/simple.html"), DEFAULT_PRIORITY, &d)); |
req->set_method("GET"); |
req->Start(); |
base::RunLoop().Run(); |
@@ -7522,29 +7566,42 @@ class URLRequestTestReferrerPolicy : public URLRequestTest { |
public: |
URLRequestTestReferrerPolicy() {} |
- void InstantiateSameOriginServers(SpawnedTestServer::Type origin_type) { |
- origin_server_.reset(new SpawnedTestServer( |
- origin_type, SpawnedTestServer::kLocalhost, |
- origin_type == SpawnedTestServer::TYPE_HTTPS |
- ? base::FilePath(FILE_PATH_LITERAL("net/data/ssl")) |
- : base::FilePath(kTestFilePath))); |
+ void InstantiateSameOriginServers(bool is_ssl) { |
+ if (is_ssl) |
+ origin_server_.reset( |
+ new EmbeddedTestServer(net::EmbeddedTestServer::TYPE_HTTPS)); |
+ else |
+ origin_server_.reset(new EmbeddedTestServer); |
+ if (is_ssl) |
+ origin_server_->AddDefaultHandlers( |
+ base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ else { |
+ origin_server_->AddDefaultHandlers(base::FilePath(kTestFilePath)); |
+ } |
ASSERT_TRUE(origin_server_->Start()); |
} |
- void InstantiateCrossOriginServers(SpawnedTestServer::Type origin_type, |
- SpawnedTestServer::Type destination_type) { |
- origin_server_.reset(new SpawnedTestServer( |
- origin_type, SpawnedTestServer::kLocalhost, |
- origin_type == SpawnedTestServer::TYPE_HTTPS |
- ? base::FilePath(FILE_PATH_LITERAL("net/data/ssl")) |
- : base::FilePath(kTestFilePath))); |
+ void InstantiateCrossOriginServers(bool origin_is_ssl, bool dest_is_ssl) { |
+ if (origin_is_ssl) { |
+ origin_server_.reset( |
+ new EmbeddedTestServer(net::EmbeddedTestServer::TYPE_HTTPS)); |
+ origin_server_->AddDefaultHandlers( |
+ base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ } else { |
+ origin_server_.reset(new EmbeddedTestServer); |
+ origin_server_->AddDefaultHandlers(base::FilePath(kTestFilePath)); |
+ } |
ASSERT_TRUE(origin_server_->Start()); |
- destination_server_.reset(new SpawnedTestServer( |
- destination_type, SpawnedTestServer::kLocalhost, |
- destination_type == SpawnedTestServer::TYPE_HTTPS |
- ? base::FilePath(FILE_PATH_LITERAL("net/data/ssl")) |
- : base::FilePath(kTestFilePath))); |
+ if (dest_is_ssl) { |
+ destination_server_.reset( |
+ new EmbeddedTestServer(net::EmbeddedTestServer::TYPE_HTTPS)); |
+ destination_server_->AddDefaultHandlers( |
+ base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ } else { |
+ destination_server_.reset(new EmbeddedTestServer); |
+ destination_server_->AddDefaultHandlers(base::FilePath(kTestFilePath)); |
+ } |
ASSERT_TRUE(destination_server_->Start()); |
} |
@@ -7555,10 +7612,10 @@ class URLRequestTestReferrerPolicy : public URLRequestTest { |
// if the origins are meant to be distinct. Otherwise, we'll use the |
// |origin_server_| for both endpoints. |
GURL destination_url = |
- destination_server_ ? destination_server_->GetURL("echoheader?Referer") |
- : origin_server_->GetURL("echoheader?Referer"); |
+ destination_server_ ? destination_server_->GetURL("/echoheader?Referer") |
+ : origin_server_->GetURL("/echoheader?Referer"); |
GURL origin_url = |
- origin_server_->GetURL("server-redirect?" + destination_url.spec()); |
+ origin_server_->GetURL("/server-redirect?" + destination_url.spec()); |
TestDelegate d; |
scoped_ptr<URLRequest> req( |
@@ -7581,175 +7638,147 @@ class URLRequestTestReferrerPolicy : public URLRequestTest { |
EXPECT_EQ(expected.spec(), d.data_received()); |
} |
- SpawnedTestServer* origin_server() const { return origin_server_.get(); } |
+ EmbeddedTestServer* origin_server() const { return origin_server_.get(); } |
private: |
- scoped_ptr<SpawnedTestServer> origin_server_; |
- scoped_ptr<SpawnedTestServer> destination_server_; |
+ scoped_ptr<EmbeddedTestServer> origin_server_; |
+ scoped_ptr<EmbeddedTestServer> destination_server_; |
}; |
TEST_F(URLRequestTestReferrerPolicy, HTTPToSameOriginHTTP) { |
- InstantiateSameOriginServers(SpawnedTestServer::TYPE_HTTP); |
+ InstantiateSameOriginServers(false); |
VerifyReferrerAfterRedirect( |
URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect( |
URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect( |
URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
} |
-// Can't spin up more than one SpawnedTestServer on Android. |
-#if defined(OS_ANDROID) |
-#define MAYBE_HTTPToCrossOriginHTTP DISABLED_HTTPToCrosOriginHTTP |
-#else |
-#define MAYBE_HTTPToCrossOriginHTTP HTTPToCrossOriginHTTP |
-#endif |
-TEST_F(URLRequestTestReferrerPolicy, MAYBE_HTTPToCrossOriginHTTP) { |
- InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTP, |
- SpawnedTestServer::TYPE_HTTP); |
+TEST_F(URLRequestTestReferrerPolicy, HTTPToCrossOriginHTTP) { |
+ InstantiateCrossOriginServers(false, false); |
VerifyReferrerAfterRedirect( |
URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect( |
URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL(std::string())); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/")); |
VerifyReferrerAfterRedirect( |
URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL(std::string())); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/")); |
VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
} |
TEST_F(URLRequestTestReferrerPolicy, HTTPSToSameOriginHTTPS) { |
- InstantiateSameOriginServers(SpawnedTestServer::TYPE_HTTPS); |
+ InstantiateSameOriginServers(true); |
VerifyReferrerAfterRedirect( |
URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect( |
URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect( |
URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
} |
-// Can't spin up more than one SpawnedTestServer on Android. |
-#if defined(OS_ANDROID) |
-#define MAYBE_HTTPSToCrossOriginHTTPS DISABLED_HTTPSToCrosOriginHTTPS |
-#else |
-#define MAYBE_HTTPSToCrossOriginHTTPS HTTPSToCrossOriginHTTPS |
-#endif |
-TEST_F(URLRequestTestReferrerPolicy, MAYBE_HTTPSToCrossOriginHTTPS) { |
- InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTPS, |
- SpawnedTestServer::TYPE_HTTPS); |
+TEST_F(URLRequestTestReferrerPolicy, HTTPSToCrossOriginHTTPS) { |
+ InstantiateCrossOriginServers(true, true); |
VerifyReferrerAfterRedirect( |
URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect( |
URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL(std::string())); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/")); |
VerifyReferrerAfterRedirect( |
URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL(std::string())); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/")); |
VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
} |
-// Can't spin up more than one SpawnedTestServer on Android. |
-#if defined(OS_ANDROID) |
-#define MAYBE_HTTPToHTTPS DISABLED_HTTPToHTTPS |
-#else |
-#define MAYBE_HTTPToHTTPS HTTPToHTTPS |
-#endif |
-TEST_F(URLRequestTestReferrerPolicy, MAYBE_HTTPToHTTPS) { |
- InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTP, |
- SpawnedTestServer::TYPE_HTTPS); |
+TEST_F(URLRequestTestReferrerPolicy, HTTPToHTTPS) { |
+ InstantiateCrossOriginServers(false, true); |
VerifyReferrerAfterRedirect( |
URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
VerifyReferrerAfterRedirect( |
URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL(std::string())); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/")); |
VerifyReferrerAfterRedirect( |
URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL(std::string())); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/")); |
VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
} |
-// Can't spin up more than one SpawnedTestServer on Android. |
-#if defined(OS_ANDROID) |
-#define MAYBE_HTTPSToHTTP DISABLED_HTTPSToHTTP |
-#else |
-#define MAYBE_HTTPSToHTTP HTTPSToHTTP |
-#endif |
-TEST_F(URLRequestTestReferrerPolicy, MAYBE_HTTPSToHTTP) { |
- InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTPS, |
- SpawnedTestServer::TYPE_HTTP); |
+TEST_F(URLRequestTestReferrerPolicy, HTTPSToHTTP) { |
+ InstantiateCrossOriginServers(true, false); |
VerifyReferrerAfterRedirect( |
URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE, |
- origin_server()->GetURL("path/to/file.html"), GURL()); |
+ origin_server()->GetURL("/path/to/file.html"), GURL()); |
VerifyReferrerAfterRedirect( |
URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), GURL()); |
+ origin_server()->GetURL("/path/to/file.html"), GURL()); |
VerifyReferrerAfterRedirect( |
URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL(std::string())); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/")); |
VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER, |
- origin_server()->GetURL("path/to/file.html"), |
- origin_server()->GetURL("path/to/file.html")); |
+ origin_server()->GetURL("/path/to/file.html"), |
+ origin_server()->GetURL("/path/to/file.html")); |
} |
class HTTPSRequestTest : public testing::Test { |
@@ -7766,16 +7795,15 @@ class HTTPSRequestTest : public testing::Test { |
}; |
TEST_F(HTTPSRequestTest, HTTPSGetTest) { |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- SpawnedTestServer::kLocalhost, |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
ASSERT_TRUE(test_server.Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -7793,11 +7821,9 @@ TEST_F(HTTPSRequestTest, HTTPSGetTest) { |
} |
TEST_F(HTTPSRequestTest, HTTPSMismatchedTest) { |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME); |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.SetSSLConfig(net::EmbeddedTestServer::CERT_MISMATCHED_NAME); |
+ test_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
ASSERT_TRUE(test_server.Start()); |
@@ -7807,7 +7833,7 @@ TEST_F(HTTPSRequestTest, HTTPSMismatchedTest) { |
{ |
d.set_allow_certificate_errors(err_allowed); |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -7828,11 +7854,9 @@ TEST_F(HTTPSRequestTest, HTTPSMismatchedTest) { |
} |
TEST_F(HTTPSRequestTest, HTTPSExpiredTest) { |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_EXPIRED); |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.SetSSLConfig(net::EmbeddedTestServer::CERT_EXPIRED); |
+ test_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
ASSERT_TRUE(test_server.Start()); |
@@ -7844,7 +7868,7 @@ TEST_F(HTTPSRequestTest, HTTPSExpiredTest) { |
{ |
d.set_allow_certificate_errors(err_allowed); |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -7864,16 +7888,14 @@ TEST_F(HTTPSRequestTest, HTTPSExpiredTest) { |
} |
} |
+#if !defined(OS_IOS) |
// This tests that a load of www.google.com with a certificate error sets |
// the |certificate_errors_are_fatal| flag correctly. This flag will cause |
// the interstitial to be fatal. |
TEST_F(HTTPSRequestTest, HTTPSPreloadedHSTSTest) { |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME); |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.SetSSLConfig(net::EmbeddedTestServer::CERT_MISMATCHED_NAME); |
+ test_server.ServeFilesFromSourceDirectory("net/data/ssl"); |
ASSERT_TRUE(test_server.Start()); |
// We require that the URL be www.google.com in order to pick up the |
@@ -7912,12 +7934,9 @@ TEST_F(HTTPSRequestTest, HTTPSPreloadedHSTSTest) { |
TEST_F(HTTPSRequestTest, HTTPSErrorsNoClobberTSSTest) { |
// The actual problem -- CERT_MISMATCHED_NAME in this case -- doesn't |
// matter. It just has to be any error. |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME); |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.SetSSLConfig(net::EmbeddedTestServer::CERT_MISMATCHED_NAME); |
+ test_server.ServeFilesFromSourceDirectory("net/data/ssl"); |
ASSERT_TRUE(test_server.Start()); |
// We require that the URL be www.google.com in order to pick up the static |
@@ -7989,18 +8008,15 @@ TEST_F(HTTPSRequestTest, HTTPSErrorsNoClobberTSSTest) { |
TEST_F(HTTPSRequestTest, HSTSPreservesPosts) { |
static const char kData[] = "hello world"; |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_OK); |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
ASSERT_TRUE(test_server.Start()); |
// Per spec, TransportSecurityState expects a domain name, rather than an IP |
// address, so a MockHostResolver is needed to redirect www.somewhere.com to |
- // the SpawnedTestServer. By default, MockHostResolver maps all hosts |
+ // the EmbeddedTestServer. By default, MockHostResolver maps all hosts |
// to 127.0.0.1. |
MockHostResolver host_resolver; |
@@ -8048,17 +8064,14 @@ TEST_F(HTTPSRequestTest, HSTSPreservesPosts) { |
TEST_F(HTTPSRequestTest, HSTSCrossOriginAddHeaders) { |
static const char kOriginHeaderValue[] = "http://www.example.com"; |
- SpawnedTestServer::SSLOptions ssl_options( |
- SpawnedTestServer::SSLOptions::CERT_OK); |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.ServeFilesFromSourceDirectory("net/data/ssl"); |
ASSERT_TRUE(test_server.Start()); |
// Per spec, TransportSecurityState expects a domain name, rather than an IP |
// address, so a MockHostResolver is needed to redirect example.net to the |
- // SpawnedTestServer. MockHostResolver maps all hosts to 127.0.0.1 by default. |
+ // EmbeddedTestServer. MockHostResolver maps all hosts to 127.0.0.1 by |
+ // default. |
MockHostResolver host_resolver; |
TransportSecurityState transport_security_state; |
@@ -8158,18 +8171,18 @@ class SSLClientAuthTestDelegate : public TestDelegate { |
// - Getting a certificate request in an SSL renegotiation sending the |
// HTTP request. |
TEST_F(HTTPSRequestTest, ClientAuthTest) { |
- SpawnedTestServer::SSLOptions ssl_options; |
- ssl_options.request_client_certificate = true; |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- ssl_options, |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ net::SSLServerConfig ssl_config; |
+ ssl_config.require_client_cert = true; |
+ test_server.SetSSLConfig(net::EmbeddedTestServer::CERT_OK, ssl_config); |
+ test_server.AddDefaultHandlers( |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
ASSERT_TRUE(test_server.Start()); |
SSLClientAuthTestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/defaultresponse"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -8374,15 +8387,13 @@ TEST_F(HTTPSRequestTest, DisableECDSAOnXP) { |
return; |
} |
- SpawnedTestServer test_server( |
- SpawnedTestServer::TYPE_HTTPS, |
- SpawnedTestServer::kLocalhost, |
- base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
+ EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ test_server.ServeFilesFromSourceDirectory("net/data/ssl"); |
ASSERT_TRUE(test_server.Start()); |
TestDelegate d; |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server.GetURL("client-cipher-list"), DEFAULT_PRIORITY, &d)); |
+ test_server.GetURL("/client-cipher-list"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -8481,8 +8492,8 @@ class HTTPSFallbackTest : public testing::Test { |
base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))); |
ASSERT_TRUE(test_server.Start()); |
- request_ = context_.CreateRequest(test_server.GetURL(std::string()), |
- DEFAULT_PRIORITY, &delegate_); |
+ request_ = context_.CreateRequest(test_server.GetURL("/"), DEFAULT_PRIORITY, |
+ &delegate_); |
request_->Start(); |
base::RunLoop().Run(); |
@@ -8637,7 +8648,7 @@ TEST_F(HTTPSRequestTest, FallbackProbeNoCache) { |
context.set_fallback_min_version(SSL_PROTOCOL_VERSION_TLS1_2); |
context.Init(); |
scoped_ptr<URLRequest> request(context.CreateRequest( |
- test_server.GetURL(std::string()), DEFAULT_PRIORITY, &delegate)); |
+ test_server.GetURL("/"), DEFAULT_PRIORITY, &delegate)); |
request->Start(); |
base::RunLoop().Run(); |
@@ -8812,8 +8823,8 @@ class HTTPSOCSPTest : public HTTPSRequestTest { |
TestDelegate d; |
d.set_allow_certificate_errors(true); |
- scoped_ptr<URLRequest> r(context_.CreateRequest( |
- test_server.GetURL(std::string()), DEFAULT_PRIORITY, &d)); |
+ scoped_ptr<URLRequest> r( |
+ context_.CreateRequest(test_server.GetURL("/"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
base::RunLoop().Run(); |
@@ -9309,9 +9320,9 @@ class URLRequestTestFTP : public URLRequestTest { |
public: |
URLRequestTestFTP() |
: ftp_transaction_factory_(&host_resolver_), |
- test_server_(SpawnedTestServer::TYPE_FTP, |
- SpawnedTestServer::kLocalhost, |
- base::FilePath(kTestFilePath)) { |
+ ftp_test_server_(SpawnedTestServer::TYPE_FTP, |
+ SpawnedTestServer::kLocalhost, |
+ base::FilePath(kTestFilePath)) { |
// Can't use |default_context_|'s HostResolver to set up the |
// FTPTransactionFactory because it hasn't been created yet. |
default_context_.set_host_resolver(&host_resolver_); |
@@ -9339,7 +9350,7 @@ class URLRequestTestFTP : public URLRequestTest { |
MockHostResolver host_resolver_; |
FtpNetworkLayer ftp_transaction_factory_; |
- SpawnedTestServer test_server_; |
+ SpawnedTestServer ftp_test_server_; |
}; |
// Make sure an FTP request using an unsafe ports fails. |
@@ -9362,12 +9373,12 @@ TEST_F(URLRequestTestFTP, UnsafePort) { |
} |
TEST_F(URLRequestTestFTP, FTPDirectoryListing) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL("/"), DEFAULT_PRIORITY, &d)); |
+ ftp_test_server_.GetURL("/"), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9377,20 +9388,20 @@ TEST_F(URLRequestTestFTP, FTPDirectoryListing) { |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_FALSE(d.received_data_before_response()); |
EXPECT_LT(0, d.bytes_received()); |
- EXPECT_EQ(test_server_.host_port_pair().host(), |
+ EXPECT_EQ(ftp_test_server_.host_port_pair().host(), |
r->GetSocketAddress().host()); |
- EXPECT_EQ(test_server_.host_port_pair().port(), |
+ EXPECT_EQ(ftp_test_server_.host_port_pair().port(), |
r->GetSocketAddress().port()); |
} |
} |
TEST_F(URLRequestTestFTP, FTPGetTestAnonymous) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(kFtpTestFile), DEFAULT_PRIORITY, &d)); |
+ ftp_test_server_.GetURL(kFtpTestFile), DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9400,22 +9411,22 @@ TEST_F(URLRequestTestFTP, FTPGetTestAnonymous) { |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_FALSE(d.received_data_before_response()); |
EXPECT_EQ(GetTestFileContents(), d.data_received()); |
- EXPECT_EQ(test_server_.host_port_pair().host(), |
+ EXPECT_EQ(ftp_test_server_.host_port_pair().host(), |
r->GetSocketAddress().host()); |
- EXPECT_EQ(test_server_.host_port_pair().port(), |
+ EXPECT_EQ(ftp_test_server_.host_port_pair().port(), |
r->GetSocketAddress().port()); |
} |
} |
TEST_F(URLRequestTestFTP, FTPGetTest) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
TestDelegate d; |
{ |
- scoped_ptr<URLRequest> r( |
- default_context_.CreateRequest(test_server_.GetURLWithUserAndPassword( |
- kFtpTestFile, "chrome", "chrome"), |
- DEFAULT_PRIORITY, &d)); |
+ scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
+ ftp_test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
+ "chrome"), |
+ DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9425,9 +9436,9 @@ TEST_F(URLRequestTestFTP, FTPGetTest) { |
EXPECT_EQ(1, d.response_started_count()); |
EXPECT_FALSE(d.received_data_before_response()); |
EXPECT_EQ(GetTestFileContents(), d.data_received()); |
- EXPECT_EQ(test_server_.host_port_pair().host(), |
+ EXPECT_EQ(ftp_test_server_.host_port_pair().host(), |
r->GetSocketAddress().host()); |
- EXPECT_EQ(test_server_.host_port_pair().port(), |
+ EXPECT_EQ(ftp_test_server_.host_port_pair().port(), |
r->GetSocketAddress().port()); |
LoadTimingInfo load_timing_info; |
@@ -9437,13 +9448,13 @@ TEST_F(URLRequestTestFTP, FTPGetTest) { |
} |
TEST_F(URLRequestTestFTP, FTPCheckWrongPassword) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
- "wrong_password"), |
+ ftp_test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
+ "wrong_password"), |
DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9458,7 +9469,7 @@ TEST_F(URLRequestTestFTP, FTPCheckWrongPassword) { |
} |
TEST_F(URLRequestTestFTP, FTPCheckWrongPasswordRestart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
TestDelegate d; |
// Set correct login credentials. The delegate will be asked for them when |
@@ -9466,8 +9477,8 @@ TEST_F(URLRequestTestFTP, FTPCheckWrongPasswordRestart) { |
d.set_credentials(AuthCredentials(kChrome, kChrome)); |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
- "wrong_password"), |
+ ftp_test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
+ "wrong_password"), |
DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9482,13 +9493,13 @@ TEST_F(URLRequestTestFTP, FTPCheckWrongPasswordRestart) { |
} |
TEST_F(URLRequestTestFTP, FTPCheckWrongUser) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
TestDelegate d; |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURLWithUserAndPassword(kFtpTestFile, "wrong_user", |
- "chrome"), |
+ ftp_test_server_.GetURLWithUserAndPassword(kFtpTestFile, "wrong_user", |
+ "chrome"), |
DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9503,7 +9514,7 @@ TEST_F(URLRequestTestFTP, FTPCheckWrongUser) { |
} |
TEST_F(URLRequestTestFTP, FTPCheckWrongUserRestart) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
TestDelegate d; |
// Set correct login credentials. The delegate will be asked for them when |
@@ -9511,8 +9522,8 @@ TEST_F(URLRequestTestFTP, FTPCheckWrongUserRestart) { |
d.set_credentials(AuthCredentials(kChrome, kChrome)); |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURLWithUserAndPassword(kFtpTestFile, "wrong_user", |
- "chrome"), |
+ ftp_test_server_.GetURLWithUserAndPassword(kFtpTestFile, "wrong_user", |
+ "chrome"), |
DEFAULT_PRIORITY, &d)); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9527,15 +9538,15 @@ TEST_F(URLRequestTestFTP, FTPCheckWrongUserRestart) { |
} |
TEST_F(URLRequestTestFTP, FTPCacheURLCredentials) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
scoped_ptr<TestDelegate> d(new TestDelegate); |
{ |
// Pass correct login identity in the URL. |
- scoped_ptr<URLRequest> r( |
- default_context_.CreateRequest(test_server_.GetURLWithUserAndPassword( |
- kFtpTestFile, "chrome", "chrome"), |
- DEFAULT_PRIORITY, d.get())); |
+ scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
+ ftp_test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
+ "chrome"), |
+ DEFAULT_PRIORITY, d.get())); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9551,7 +9562,7 @@ TEST_F(URLRequestTestFTP, FTPCacheURLCredentials) { |
{ |
// This request should use cached identity from previous request. |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(kFtpTestFile), DEFAULT_PRIORITY, d.get())); |
+ ftp_test_server_.GetURL(kFtpTestFile), DEFAULT_PRIORITY, d.get())); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9565,7 +9576,7 @@ TEST_F(URLRequestTestFTP, FTPCacheURLCredentials) { |
} |
TEST_F(URLRequestTestFTP, FTPCacheLoginBoxCredentials) { |
- ASSERT_TRUE(test_server_.Start()); |
+ ASSERT_TRUE(ftp_test_server_.Start()); |
scoped_ptr<TestDelegate> d(new TestDelegate); |
// Set correct login credentials. The delegate will be asked for them when |
@@ -9573,8 +9584,8 @@ TEST_F(URLRequestTestFTP, FTPCacheLoginBoxCredentials) { |
d->set_credentials(AuthCredentials(kChrome, kChrome)); |
{ |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
- "wrong_password"), |
+ ftp_test_server_.GetURLWithUserAndPassword(kFtpTestFile, "chrome", |
+ "wrong_password"), |
DEFAULT_PRIORITY, d.get())); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |
@@ -9594,7 +9605,7 @@ TEST_F(URLRequestTestFTP, FTPCacheLoginBoxCredentials) { |
// Don't pass wrong credentials in the URL, they would override valid cached |
// ones. |
scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
- test_server_.GetURL(kFtpTestFile), DEFAULT_PRIORITY, d.get())); |
+ ftp_test_server_.GetURL(kFtpTestFile), DEFAULT_PRIORITY, d.get())); |
r->Start(); |
EXPECT_TRUE(r->is_pending()); |