Index: net/test/embedded_test_server/default_handlers.cc |
diff --git a/net/test/embedded_test_server/default_handlers.cc b/net/test/embedded_test_server/default_handlers.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..8c314183357c4d99bc036bf8da37c7114413b62f |
--- /dev/null |
+++ b/net/test/embedded_test_server/default_handlers.cc |
@@ -0,0 +1,589 @@ |
+// Copyright 2015 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "net/test/embedded_test_server/default_handlers.h" |
+ |
+#include <stdlib.h> |
+#include <ctime> |
+#include <map> |
+#include <sstream> |
+#include <string> |
+ |
+#include "base/base64.h" |
+#include "base/files/file_path.h" |
+#include "base/files/file_util.h" |
+#include "base/format_macros.h" |
+#include "base/md5.h" |
+#include "base/path_service.h" |
+#include "base/strings/string_split.h" |
+#include "base/strings/string_util.h" |
+#include "base/strings/stringprintf.h" |
+#include "base/thread_task_runner_handle.h" |
+#include "base/time/time.h" |
+#include "net/base/escape.h" |
+#include "net/base/url_util.h" |
+#include "net/test/embedded_test_server/http_request.h" |
+#include "net/test/embedded_test_server/http_response.h" |
+#include "net/test/embedded_test_server/request_handler_util.h" |
+ |
+namespace net { |
+namespace test_server { |
+namespace { |
+ |
+const UnescapeRule::Type kUnescapeAll = |
+ UnescapeRule::SPACES | UnescapeRule::URL_SPECIAL_CHARS | |
+ UnescapeRule::SPOOFING_AND_CONTROL_CHARS | |
+ UnescapeRule::REPLACE_PLUS_WITH_SPACE; |
+ |
+const char kDefaultRealm[] = "testrealm"; |
+const char kDefaultPassword[] = "secret"; |
+ |
+scoped_ptr<HttpResponse> HandleDefaultConnect(const HttpRequest& request) { |
+ if (request.method != METHOD_CONNECT) |
+ return nullptr; |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_code(HTTP_BAD_REQUEST); |
+ http_response->set_content( |
+ "Your client has issued a malformed or illegal request."); |
+ http_response->set_content_type("text/html"); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleCacheTime(const HttpRequest& request) { |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content( |
+ "<html><head><title>Cache: max-age=60</title></head></html>"); |
+ http_response->set_content_type("text/html"); |
+ http_response->AddCustomHeader("Cache-Control", "max-age=60"); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleEchoHeader(std::string url, |
+ std::string cache_control, |
mmenke
2015/10/29 20:20:29
const std::string& (x2)
svaldez
2015/10/29 21:27:37
Done.
|
+ const HttpRequest& request) { |
+ if (!ShouldHandle(request, url)) |
+ return nullptr; |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ |
+ GURL request_gurl = request.GetURL(); |
mmenke
2015/10/29 20:20:28
Suggest using request_url everywhere in this file
svaldez
2015/10/29 21:27:37
Done.
|
+ if (request_gurl.has_query()) { |
+ std::string header_name = request_gurl.query(); |
+ http_response->AddCustomHeader("Vary", header_name); |
+ if (request.headers.find(header_name) != request.headers.end()) |
+ http_response->set_content(request.headers.at(header_name)); |
+ else |
+ http_response->set_content("None"); |
+ } |
+ |
+ http_response->set_content_type("text/plain"); |
+ http_response->AddCustomHeader("Cache-Control", cache_control); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleEcho(const HttpRequest& request) { |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ |
+ GURL request_gurl = request.GetURL(); |
+ if (request_gurl.has_query()) { |
+ RequestQuery query = ParseQuery(request_gurl); |
+ if (query.find("status") != query.end()) |
+ http_response->set_code(static_cast<HttpStatusCode>( |
+ std::atoi(query["status"].front().c_str()))); |
+ } |
+ |
+ http_response->set_content_type("text/html"); |
+ if (request.method != METHOD_POST && request.method != METHOD_PUT) |
+ http_response->set_content("Echo"); |
mmenke
2015/10/29 20:20:29
The old handler just sent an empty body in this ca
svaldez
2015/10/29 21:27:37
The other server had the behavior that it would al
|
+ else |
+ http_response->set_content(request.content); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleEchoTitle(const HttpRequest& request) { |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content("<html><head><title>" + request.content + |
+ "</title></head></html>"); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleEchoAll(const HttpRequest& request) { |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ |
+ std::string body = |
+ "<html><head><style>" |
+ "pre { border: 1px solid black; margin: 5px; padding: 5px }" |
+ "</style></head><body>" |
+ "<div style=\"float: right\">" |
+ "<a href=\"/echo\">back to referring page</a></div>" |
+ "<h1>Request Body:</h1><pre>"; |
+ |
+ if (request.has_content) { |
+ std::vector<std::string> qs = base::SplitString( |
mmenke
2015/10/29 20:20:29
Avoid uncommon abbreviations in variable names. S
svaldez
2015/10/29 21:27:37
Done.
|
+ request.content, "&", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL); |
+ for (size_t i = 0; i < qs.size(); ++i) { |
+ body += qs[i] + "\n"; |
+ } |
+ } |
+ |
+ body += |
+ "</pre>" |
+ "<h1>Request Headers:</h1><pre>" + |
+ request.all_headers + |
+ "</pre>" |
+ "</body></html>"; |
+ |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content(body); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleSetCookie(const HttpRequest& request) { |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content_type("text/html"); |
+ std::string content; |
+ GURL request_gurl = request.GetURL(); |
+ if (request_gurl.has_query()) { |
+ std::vector<std::string> cookies = base::SplitString( |
+ request_gurl.query(), "&", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL); |
+ for (size_t i = 0; i < cookies.size(); ++i) { |
mmenke
2015/10/29 20:20:29
nit: Range loop.
svaldez
2015/10/29 21:27:37
Done.
|
+ http_response->AddCustomHeader("Set-Cookie", cookies[i]); |
+ content += cookies[i]; |
+ } |
+ } |
+ |
+ http_response->set_content(content); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleSetManyCookies(const HttpRequest& request) { |
+ std::string content; |
+ |
+ GURL request_gurl = request.GetURL(); |
+ size_t num = 0; |
+ if (request_gurl.has_query()) { |
+ num = std::atoi(request_gurl.query().c_str()); |
+ } |
mmenke
2015/10/29 20:20:29
nit: Remove braces.
svaldez
2015/10/29 21:27:38
Done.
|
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content_type("text/html"); |
+ for (size_t i = 0; i < num; ++i) { |
+ http_response->AddCustomHeader("Set-Cookie", "a="); |
+ } |
+ |
+ http_response->set_content( |
+ base::StringPrintf("%" PRIuS " cookies were sent", num)); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleExpectAndSetCookie(const HttpRequest& request) { |
+ std::vector<std::string> sentCookies; |
mmenke
2015/10/29 20:20:29
sent_cookies - maybe received_cookies would be cle
svaldez
2015/10/29 21:27:37
Done.
|
+ if (request.headers.find("Cookie") != request.headers.end()) { |
+ std::vector<std::string> cookies = |
+ base::SplitString(request.headers.at("Cookie"), ";", |
+ base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL); |
+ for (size_t i = 0; i < cookies.size(); ++i) { |
+ sentCookies.push_back(cookies[i]); |
mmenke
2015/10/29 20:20:29
You're copying everything in one vector of std::st
svaldez
2015/10/29 21:27:37
Done.
|
+ } |
+ } |
+ bool got_expected = true; |
mmenke
2015/10/29 20:20:28
nit: got_all_expected? Think it's a little clear
svaldez
2015/10/29 21:27:37
Done.
|
+ |
+ GURL request_gurl = request.GetURL(); |
+ RequestQuery qs = ParseQuery(request_gurl); |
mmenke
2015/10/29 20:20:28
Avoid uncommon abbreviations in variable names.
svaldez
2015/10/29 21:27:37
Done.
|
+ if (qs.find("expect") != qs.end()) { |
+ std::vector<std::string> expected = qs.at("expect"); |
mmenke
2015/10/29 20:20:29
expected_cookies?
svaldez
2015/10/29 21:27:37
Done.
|
+ for (size_t i = 0; i < expected.size(); ++i) { |
mmenke
2015/10/29 20:20:29
Suggest range loops (x4). Perf doesn't really mat
svaldez
2015/10/29 21:27:38
Done.
|
+ bool found = false; |
+ for (size_t j = 0; j < sentCookies.size(); ++j) { |
mmenke
2015/10/29 20:20:28
Could just use std::find, though suppose it doesn'
svaldez
2015/10/29 21:27:37
Acknowledged.
|
+ if (expected[i] == sentCookies[j]) |
+ found = true; |
+ } |
+ got_expected &= found; |
+ } |
+ } |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content_type("text/html"); |
+ if (got_expected) { |
+ std::vector<std::string> setCookies = qs.at("set"); |
mmenke
2015/10/29 20:20:28
set_cookies
svaldez
2015/10/29 21:27:37
Done.
|
+ for (size_t i = 0; i < setCookies.size(); ++i) { |
+ http_response->AddCustomHeader( |
+ "Set-Cookie", net::UnescapeURLComponent(setCookies[i], kUnescapeAll)); |
+ } |
+ } |
+ |
+ std::string content; |
+ if (qs.find("data") != qs.end()) { |
+ std::vector<std::string> data = qs.at("data"); |
+ for (size_t i = 0; i < data.size(); ++i) { |
+ content += data[i]; |
+ } |
+ } |
+ |
+ http_response->set_content(content); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleSetHeader(const HttpRequest& request) { |
+ std::string content; |
+ |
+ GURL request_gurl = request.GetURL(); |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content_type("text/html"); |
+ if (request_gurl.has_query()) { |
+ RequestQuery headers = ParseQuery(request_gurl); |
+ for (auto header : headers) { |
mmenke
2015/10/29 20:20:29
const auto&
svaldez
2015/10/29 21:27:37
Done.
|
+ std::string key = header.first.substr(0, header.first.find(": ")); |
+ std::string value = header.first.substr(header.first.find(": ") + 2); |
mmenke
2015/10/29 20:20:29
Should be careful about find returning npos.
svaldez
2015/10/29 21:27:38
Done.
|
+ http_response->AddCustomHeader(key, value); |
+ content += header.first; |
+ } |
+ } |
+ |
+ http_response->set_content(content); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleNoContent(const HttpRequest& request) { |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_code(HTTP_NO_CONTENT); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleCloseSocket(const HttpRequest& request) { |
+ scoped_ptr<RawHttpResponse> http_response(new RawHttpResponse("", "")); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleAuthBasic(const HttpRequest& request) { |
+ GURL request_gurl = request.GetURL(); |
+ RequestQuery query = ParseQuery(request_gurl); |
+ |
+ std::string expected_password = kDefaultPassword; |
+ if (query.find("password") != query.end()) |
+ expected_password = query.at("password").front(); |
+ std::string realm = kDefaultRealm; |
+ if (query.find("realm") != query.end()) |
+ realm = query.at("realm").front(); |
+ |
+ bool authed = false; |
+ std::string error; |
+ std::string auth; |
+ std::string username; |
+ std::string userpass; |
+ std::string password; |
+ std::string b64str; |
+ if (request.headers.find("Authorization") == request.headers.end()) { |
+ error = "Missing Authorization Header"; |
+ } else { |
+ auth = request.headers.at("Authorization"); |
+ if (auth.find("Basic ") == std::string::npos) { |
+ error = "Invalid Authorization Header"; |
+ } else { |
+ b64str = auth.substr(std::string("Basic ").size()); |
+ base::Base64Decode(b64str, &userpass); |
+ if (userpass.find(":") != std::string::npos) { |
+ username = userpass.substr(0, userpass.find(":")); |
+ password = userpass.substr(userpass.find(":") + 1); |
+ if (password == expected_password) |
+ authed = true; |
+ else |
+ error = "Invalid Credentials"; |
+ } else |
+ error = "Invalid Credentials"; |
mmenke
2015/10/29 20:20:29
Use braces. (Both parts of an if/else should eith
svaldez
2015/10/29 21:27:37
Done.
|
+ } |
+ } |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ if (!authed) { |
+ http_response->set_code(HTTP_UNAUTHORIZED); |
+ http_response->set_content_type("text/html"); |
+ http_response->AddCustomHeader("WWW-Authenticate", |
+ "Basic realm=\"" + realm + "\""); |
+ if (query.find("set-cookie-if-challenged") != query.end()) |
+ http_response->AddCustomHeader("Set-Cookie", "got_challenged=true"); |
+ http_response->set_content(base::StringPrintf( |
+ "<html><head><title>Denied: %s</title></head>" |
+ "<body>auth=%s<p>b64str=%s<p>username: %s<p>userpass: %s<p>" |
+ "password: %s<p>You sent:<br>%s<p></body></html>", |
+ error.c_str(), auth.c_str(), b64str.c_str(), username.c_str(), |
+ userpass.c_str(), password.c_str(), request.all_headers.c_str())); |
+ return http_response.Pass(); |
+ } |
+ |
+ if (request.headers.find("If-None-Match") != request.headers.end() && |
+ request.headers.at("If-None-Match") == "abc") { |
mmenke
2015/10/29 20:20:29
"abc" should probably be a local constant. kEtag o
svaldez
2015/10/29 21:27:37
Done.
|
+ http_response->set_code(HTTP_NOT_MODIFIED); |
+ return http_response.Pass(); |
+ } |
+ |
+ base::FilePath file_path = |
+ base::FilePath().AppendASCII(request.relative_url.substr(1)); |
mmenke
2015/10/29 20:20:28
Hrm... This seems kind of silly, but I guess Gene
svaldez
2015/10/29 21:27:38
Acknowledged.
|
+ if (file_path.FinalExtension() == FILE_PATH_LITERAL("gif")) { |
+ base::FilePath server_root; |
+ PathService::Get(base::DIR_SOURCE_ROOT, &server_root); |
+ base::FilePath gif_path = |
+ server_root.AppendASCII("chrome/test/data/google/logo.gif"); |
mmenke
2015/10/29 20:20:29
Suggest making this path a const char[] at the top
svaldez
2015/10/29 21:27:37
Done.
|
+ std::string gif_data; |
+ base::ReadFileToString(gif_path, &gif_data); |
+ http_response->set_content_type("image/gif"); |
+ http_response->set_content(gif_data); |
+ } else { |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content( |
+ base::StringPrintf("<html><head><title>%s/%s</title></head>" |
+ "<body>auth=%s<p>You sent:<br>%s<p></body></html>", |
+ username.c_str(), password.c_str(), auth.c_str(), |
+ request.all_headers.c_str())); |
+ } |
+ |
+ http_response->AddCustomHeader("Cache-Control", "max-age=60000"); |
+ http_response->AddCustomHeader("Etag", "abc"); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleAuthDigest(const HttpRequest& request) { |
+ std::string nonce = base::MD5String( |
+ base::StringPrintf("privatekey%s", request.relative_url.c_str())); |
+ std::string opaque = base::MD5String("opaque"); |
+ std::string password = kDefaultPassword; |
+ std::string realm = kDefaultRealm; |
+ |
+ bool authed = false; |
+ std::string error; |
+ std::string auth; |
+ std::string digest_str = "Digest"; |
+ std::string username; |
+ if (request.headers.find("Authorization") == request.headers.end()) { |
+ error = "no auth"; |
+ } else if (request.headers.at("Authorization").substr(0, digest_str.size()) != |
+ digest_str) { |
+ error = "not digest"; |
+ } else { |
+ auth = request.headers.at("Authorization"); |
+ |
+ std::map<std::string, std::string> auth_pairs; |
+ std::vector<std::string> authVector = base::SplitString( |
+ auth, ", ", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL); |
mmenke
2015/10/29 20:20:29
May be a little cleaner to use SplitStringIntoKeyV
svaldez
2015/10/29 21:27:37
Done.
|
+ for (auto authPair : authVector) { |
mmenke
2015/10/29 20:20:29
const auto&
svaldez
2015/10/29 21:27:37
Done.
|
+ std::string key = authPair.substr(0, authPair.find("=")); |
+ std::string value = authPair.substr(authPair.find("=") + 1); |
mmenke
2015/10/29 20:20:28
Should handle the case authPair.find("=") is npos.
svaldez
2015/10/29 21:27:37
Acknowledged.
|
+ if (value.substr(0, 1) == "\"" && value.substr(value.size() - 1) == "\"") |
+ value = value.substr(1, value.size() - 2); |
+ auth_pairs[key] = value; |
+ } |
+ |
+ if (auth_pairs["nonce"] != nonce) { |
+ error = "wrong nonce"; |
+ } else if (auth_pairs["opaque"] != opaque) { |
+ error = "wrong opaque"; |
+ } else { |
+ username = auth_pairs["username"]; |
+ |
+ std::string hash1 = base::MD5String( |
+ base::StringPrintf("%s:%s:%s", auth_pairs["username"].c_str(), |
+ realm.c_str(), password.c_str())); |
+ std::string hash2 = base::MD5String(base::StringPrintf( |
+ "%s:%s", request.method_string.c_str(), auth_pairs["uri"].c_str())); |
+ |
+ std::string response; |
+ if (auth_pairs.find("qop") != auth_pairs.end() && |
+ auth_pairs.find("nc") != auth_pairs.end() && |
+ auth_pairs.find("cnonce") != auth_pairs.end()) { |
+ response = base::MD5String(base::StringPrintf( |
+ "%s:%s:%s:%s:%s:%s", hash1.c_str(), nonce.c_str(), |
+ auth_pairs["nc"].c_str(), auth_pairs["cnonce"].c_str(), |
+ auth_pairs["qop"].c_str(), hash2.c_str())); |
+ } else { |
+ response = base::MD5String(base::StringPrintf( |
+ "%s:%s:%s", hash1.c_str(), nonce.c_str(), hash2.c_str())); |
+ } |
+ |
+ if (auth_pairs["response"] == response) |
+ authed = true; |
+ else |
+ error = "wrong password"; |
+ } |
+ } |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ if (!authed) { |
+ http_response->set_code(HTTP_UNAUTHORIZED); |
+ http_response->set_content_type("text/html"); |
+ std::string authHeader = base::StringPrintf( |
mmenke
2015/10/29 20:20:29
auth_header
svaldez
2015/10/29 21:27:38
Done.
|
+ "Digest realm=\"%s\", " |
+ "domain=\"/\", qop=\"auth\", algorithm=MD5, nonce=\"%s\", " |
+ "opaque=\"%s\"", |
+ realm.c_str(), nonce.c_str(), opaque.c_str()); |
+ http_response->AddCustomHeader("WWW-Authenticate", authHeader); |
+ http_response->set_content(base::StringPrintf( |
+ "<html><head><title>Denied: %s</title></head>" |
+ "<body>auth=%s<p>" |
+ "You sent:<br>%s<p>We are replying:<br>%s<p></body></html>", |
+ error.c_str(), auth.c_str(), request.all_headers.c_str(), |
+ authHeader.c_str())); |
+ return http_response.Pass(); |
+ } |
+ |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content( |
+ base::StringPrintf("<html><head><title>%s/%s</title></head>" |
+ "<body>auth=%s<p></body></html>", |
+ username.c_str(), password.c_str(), auth.c_str())); |
+ |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleServerRedirect(const HttpRequest& request) { |
+ GURL request_gurl = request.GetURL(); |
+ std::string dest = |
+ net::UnescapeURLComponent(request_gurl.query(), kUnescapeAll); |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_code(HTTP_MOVED_PERMANENTLY); |
+ http_response->AddCustomHeader("Location", dest); |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content(base::StringPrintf( |
+ "<html><head></head><body>Redirecting to %s</body></html>", |
+ dest.c_str())); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleCrossSiteRedirect(EmbeddedTestServer* server, |
+ const HttpRequest& request) { |
+ if (!ShouldHandle(request, "/cross-site")) |
+ return nullptr; |
+ |
+ std::string dest_all = net::UnescapeURLComponent( |
+ request.relative_url.substr(std::string("/cross-site").size() + 1), |
+ kUnescapeAll); |
+ |
+ std::string dest = base::StringPrintf( |
+ "//%s:%hu/%s", dest_all.substr(0, dest_all.find("/")).c_str(), |
+ server->port(), dest_all.substr(dest_all.find("/") + 1).c_str()); |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_code(HTTP_MOVED_PERMANENTLY); |
+ http_response->AddCustomHeader("Location", dest); |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content(base::StringPrintf( |
+ "<html><head></head><body>Redirecting to %s</body></html>", |
+ dest.c_str())); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleClientRedirect(const HttpRequest& request) { |
+ GURL request_gurl = request.GetURL(); |
+ std::string dest = |
+ net::UnescapeURLComponent(request_gurl.query(), kUnescapeAll); |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content(base::StringPrintf( |
+ "<html><head><meta http-equiv=\"refresh\" content=\"0;url=%s\"></head>" |
+ "<body>Redirecting to %s</body></html>", |
+ dest.c_str(), dest.c_str())); |
+ return http_response.Pass(); |
+} |
+ |
+scoped_ptr<HttpResponse> HandleDefaultResponse(const HttpRequest& request) { |
+ scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
+ http_response->set_content_type("text/html"); |
+ http_response->set_content("Default response given for path: " + |
+ request.relative_url); |
+ return http_response.Pass(); |
+} |
+ |
+class DelayedHttpResponse : public BasicHttpResponse { |
+ public: |
+ DelayedHttpResponse(double delay) : delay_(delay) {} |
+ |
+ void SendResponse(const SendBytesCallback& send, |
+ const SendCompleteCallback& done) override { |
+ base::ThreadTaskRunnerHandle::Get()->PostDelayedTask( |
+ FROM_HERE, base::Bind(send, ToResponseString(), done), |
+ base::TimeDelta::FromSecondsD(delay_)); |
+ } |
+ |
+ private: |
+ double delay_; |
+}; |
+ |
+scoped_ptr<HttpResponse> HandleSlowServer(const HttpRequest& request) { |
+ double delay = 1.0f; |
+ |
+ GURL request_gurl = request.GetURL(); |
+ if (request_gurl.has_query()) { |
+ delay = std::atof(request_gurl.query().c_str()); |
+ } |
+ |
+ scoped_ptr<BasicHttpResponse> http_response(new DelayedHttpResponse(delay)); |
+ http_response->set_content_type("text/plain"); |
+ http_response->set_content(base::StringPrintf("waited %.1f seconds", delay)); |
+ return http_response.Pass(); |
+} |
+ |
+} // namespace anonymous |
+ |
+#define PREFIXED_HANDLER(prefix, handler) \ |
+ base::Bind(&HandlePrefixedRequest, prefix, base::Bind(handler)) |
+ |
+void RegisterDefaultHandlers(EmbeddedTestServer* server) { |
+ server->RegisterDefaultHandler(base::Bind(&HandleDefaultConnect)); |
+ |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/cachetime", &HandleCacheTime)); |
+ server->RegisterDefaultHandler( |
+ base::Bind(&HandleEchoHeader, "/echoheader", "no-cache")); |
+ server->RegisterDefaultHandler( |
+ base::Bind(&HandleEchoHeader, "/echoheadercache", "max-age=60000")); |
+ server->RegisterDefaultHandler(PREFIXED_HANDLER("/echo", &HandleEcho)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/echotitle", &HandleEchoTitle)); |
+ server->RegisterDefaultHandler(PREFIXED_HANDLER("/echoall", &HandleEchoAll)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/set-cookie", &HandleSetCookie)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/set-many-cookies", &HandleSetManyCookies)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/expect-and-set-cookie", &HandleExpectAndSetCookie)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/set-header", &HandleSetHeader)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/nocontent", &HandleNoContent)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/close-socket", &HandleCloseSocket)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/auth-basic", &HandleAuthBasic)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/auth-digest", &HandleAuthDigest)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/server-redirect", &HandleServerRedirect)); |
+ server->RegisterDefaultHandler(base::Bind(&HandleCrossSiteRedirect, server)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/client-redirect", &HandleClientRedirect)); |
+ server->RegisterDefaultHandler( |
+ PREFIXED_HANDLER("/defaultresponse", &HandleDefaultResponse)); |
+ server->RegisterDefaultHandler(PREFIXED_HANDLER("/slow", &HandleSlowServer)); |
+ |
+ // TODO(svaldez): HandleDownload |
+ // TODO(svaldez): HandleDownloadFinish |
+ // TODO(svaldez): HandleZipFile |
+ // TODO(svaldez): HandleRangeReset |
+ // TODO(svaldez): HandleSSLManySmallRecords |
+ // TODO(svaldez): HandleChunkedServer |
+ // TODO(svaldez): HandleGetSSLSessionCache |
+ // TODO(svaldez): HandleGetChannelID |
+ // TODO(svaldez): HandleGetClientCert |
+ // TODO(svaldez): HandleClientCipherList |
+ // TODO(svaldez): HandleEchoMultipartPost |
+} |
+ |
+#undef PREFIXED_HANDLER |
+ |
+} // namespace test_server |
+} // namespace net |