Chromium Code Reviews| Index: net/test/embedded_test_server/default_handlers.cc |
| diff --git a/net/test/embedded_test_server/default_handlers.cc b/net/test/embedded_test_server/default_handlers.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..a6e5a552636cc5d56d1488389699832e20114bff |
| --- /dev/null |
| +++ b/net/test/embedded_test_server/default_handlers.cc |
| @@ -0,0 +1,586 @@ |
| +// Copyright 2015 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "net/test/embedded_test_server/default_handlers.h" |
| + |
| +#include <stdlib.h> |
| +#include <ctime> |
| +#include <map> |
| +#include <sstream> |
| +#include <string> |
| + |
| +#include "base/base64.h" |
| +#include "base/files/file_path.h" |
| +#include "base/files/file_util.h" |
| +#include "base/format_macros.h" |
| +#include "base/md5.h" |
| +#include "base/path_service.h" |
| +#include "base/strings/string_split.h" |
| +#include "base/strings/string_util.h" |
| +#include "base/strings/stringprintf.h" |
| +#include "base/thread_task_runner_handle.h" |
| +#include "base/time/time.h" |
| +#include "net/base/escape.h" |
| +#include "net/base/url_util.h" |
| +#include "net/test/embedded_test_server/http_request.h" |
| +#include "net/test/embedded_test_server/http_response.h" |
| +#include "net/test/embedded_test_server/request_handler_util.h" |
| + |
| +namespace net { |
| +namespace test_server { |
| +namespace { |
| + |
| +const UnescapeRule::Type kUnescapeAll = |
| + UnescapeRule::SPACES | UnescapeRule::URL_SPECIAL_CHARS | |
| + UnescapeRule::SPOOFING_AND_CONTROL_CHARS | |
| + UnescapeRule::REPLACE_PLUS_WITH_SPACE; |
| + |
| +const char kDefaultRealm[] = "testrealm"; |
| +const char kDefaultPassword[] = "secret"; |
| +const char kEtag[] = "abc"; |
| +const char kLogoPath[] = "chrome/test/data/google/logo.gif"; |
| + |
| +scoped_ptr<HttpResponse> HandleDefaultConnect(const HttpRequest& request) { |
| + if (request.method != METHOD_CONNECT) |
| + return nullptr; |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_code(HTTP_BAD_REQUEST); |
| + http_response->set_content( |
| + "Your client has issued a malformed or illegal request."); |
| + http_response->set_content_type("text/html"); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleCacheTime(const HttpRequest& request) { |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content( |
| + "<html><head><title>Cache: max-age=60</title></head></html>"); |
| + http_response->set_content_type("text/html"); |
| + http_response->AddCustomHeader("Cache-Control", "max-age=60"); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleEchoHeader(const std::string& url, |
| + const std::string& cache_control, |
| + const HttpRequest& request) { |
| + if (!ShouldHandle(request, url)) |
| + return nullptr; |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + |
| + GURL request_url = request.GetURL(); |
| + if (request_url.has_query()) { |
| + std::string header_name = request_url.query(); |
| + http_response->AddCustomHeader("Vary", header_name); |
| + if (request.headers.find(header_name) != request.headers.end()) |
| + http_response->set_content(request.headers.at(header_name)); |
| + else |
| + http_response->set_content("None"); |
| + } |
| + |
| + http_response->set_content_type("text/plain"); |
| + http_response->AddCustomHeader("Cache-Control", cache_control); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleEcho(const HttpRequest& request) { |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + |
| + GURL request_url = request.GetURL(); |
| + if (request_url.has_query()) { |
| + RequestQuery query = ParseQuery(request_url); |
| + if (query.find("status") != query.end()) |
| + http_response->set_code(static_cast<HttpStatusCode>( |
| + std::atoi(query["status"].front().c_str()))); |
| + } |
| + |
| + http_response->set_content_type("text/html"); |
| + if (request.method != METHOD_POST && request.method != METHOD_PUT) |
| + http_response->set_content("Echo"); |
| + else |
| + http_response->set_content(request.content); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleEchoTitle(const HttpRequest& request) { |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content("<html><head><title>" + request.content + |
| + "</title></head></html>"); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleEchoAll(const HttpRequest& request) { |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + |
| + std::string body = |
| + "<html><head><style>" |
| + "pre { border: 1px solid black; margin: 5px; padding: 5px }" |
| + "</style></head><body>" |
| + "<div style=\"float: right\">" |
| + "<a href=\"/echo\">back to referring page</a></div>" |
| + "<h1>Request Body:</h1><pre>"; |
| + |
| + if (request.has_content) { |
| + std::vector<std::string> query_list = base::SplitString( |
| + request.content, "&", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL); |
| + for (const auto& query : query_list) |
| + body += query + "\n"; |
| + } |
| + |
| + body += |
| + "</pre>" |
| + "<h1>Request Headers:</h1><pre>" + |
| + request.all_headers + |
| + "</pre>" |
| + "</body></html>"; |
| + |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content(body); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleSetCookie(const HttpRequest& request) { |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content_type("text/html"); |
| + std::string content; |
| + GURL request_url = request.GetURL(); |
| + if (request_url.has_query()) { |
| + std::vector<std::string> cookies = base::SplitString( |
| + request_url.query(), "&", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL); |
| + for (const auto& cookie : cookies) { |
| + http_response->AddCustomHeader("Set-Cookie", cookie); |
| + content += cookie; |
| + } |
| + } |
| + |
| + http_response->set_content(content); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleSetManyCookies(const HttpRequest& request) { |
| + std::string content; |
| + |
| + GURL request_url = request.GetURL(); |
| + size_t num = 0; |
| + if (request_url.has_query()) |
| + num = std::atoi(request_url.query().c_str()); |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content_type("text/html"); |
| + for (size_t i = 0; i < num; ++i) { |
| + http_response->AddCustomHeader("Set-Cookie", "a="); |
| + } |
| + |
| + http_response->set_content( |
| + base::StringPrintf("%" PRIuS " cookies were sent", num)); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleExpectAndSetCookie(const HttpRequest& request) { |
| + std::vector<std::string> received_cookies; |
| + if (request.headers.find("Cookie") != request.headers.end()) { |
| + received_cookies = |
| + base::SplitString(request.headers.at("Cookie"), ";", |
| + base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL); |
| + } |
| + |
| + bool got_all_expected = true; |
| + GURL request_url = request.GetURL(); |
| + RequestQuery query_list = ParseQuery(request_url); |
| + if (query_list.find("expect") != query_list.end()) { |
| + for (const auto& expected_cookie : query_list.at("expect")) { |
| + bool found = false; |
| + for (const auto& received_cookie : received_cookies) { |
| + if (expected_cookie == received_cookie) |
| + found = true; |
| + } |
| + got_all_expected &= found; |
| + } |
| + } |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content_type("text/html"); |
| + if (got_all_expected) { |
| + for (const auto& cookie : query_list.at("set")) { |
| + http_response->AddCustomHeader( |
| + "Set-Cookie", net::UnescapeURLComponent(cookie, kUnescapeAll)); |
| + } |
| + } |
| + |
| + std::string content; |
| + if (query_list.find("data") != query_list.end()) { |
| + for (const auto& item : query_list.at("data")) |
| + content += item; |
| + } |
| + |
| + http_response->set_content(content); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleSetHeader(const HttpRequest& request) { |
| + std::string content; |
| + |
| + GURL request_url = request.GetURL(); |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content_type("text/html"); |
| + if (request_url.has_query()) { |
| + RequestQuery headers = ParseQuery(request_url); |
| + for (const auto& header : headers) { |
| + if (header.first.find(": ") == std::string::npos) |
|
mmenke
2015/10/30 15:26:35
Suggest just stuffing this in a local. 3 find cal
svaldez
2015/10/30 15:57:40
Done.
|
| + continue; |
| + std::string key = header.first.substr(0, header.first.find(": ")); |
| + std::string value = header.first.substr(header.first.find(": ") + 2); |
| + http_response->AddCustomHeader(key, value); |
| + content += header.first; |
| + } |
| + } |
| + |
| + http_response->set_content(content); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleNoContent(const HttpRequest& request) { |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_code(HTTP_NO_CONTENT); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleCloseSocket(const HttpRequest& request) { |
| + scoped_ptr<RawHttpResponse> http_response(new RawHttpResponse("", "")); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleAuthBasic(const HttpRequest& request) { |
| + GURL request_url = request.GetURL(); |
| + RequestQuery query = ParseQuery(request_url); |
| + |
| + std::string expected_password = kDefaultPassword; |
| + if (query.find("password") != query.end()) |
| + expected_password = query.at("password").front(); |
| + std::string realm = kDefaultRealm; |
| + if (query.find("realm") != query.end()) |
| + realm = query.at("realm").front(); |
| + |
| + bool authed = false; |
| + std::string error; |
| + std::string auth; |
| + std::string username; |
| + std::string userpass; |
| + std::string password; |
| + std::string b64str; |
| + if (request.headers.find("Authorization") == request.headers.end()) { |
| + error = "Missing Authorization Header"; |
| + } else { |
| + auth = request.headers.at("Authorization"); |
| + if (auth.find("Basic ") == std::string::npos) { |
| + error = "Invalid Authorization Header"; |
| + } else { |
| + b64str = auth.substr(std::string("Basic ").size()); |
| + base::Base64Decode(b64str, &userpass); |
| + if (userpass.find(":") != std::string::npos) { |
| + username = userpass.substr(0, userpass.find(":")); |
| + password = userpass.substr(userpass.find(":") + 1); |
| + if (password == expected_password) |
| + authed = true; |
| + else |
| + error = "Invalid Credentials"; |
| + } else { |
| + error = "Invalid Credentials"; |
| + } |
| + } |
| + } |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + if (!authed) { |
| + http_response->set_code(HTTP_UNAUTHORIZED); |
| + http_response->set_content_type("text/html"); |
| + http_response->AddCustomHeader("WWW-Authenticate", |
| + "Basic realm=\"" + realm + "\""); |
| + if (query.find("set-cookie-if-challenged") != query.end()) |
| + http_response->AddCustomHeader("Set-Cookie", "got_challenged=true"); |
| + http_response->set_content(base::StringPrintf( |
| + "<html><head><title>Denied: %s</title></head>" |
| + "<body>auth=%s<p>b64str=%s<p>username: %s<p>userpass: %s<p>" |
| + "password: %s<p>You sent:<br>%s<p></body></html>", |
| + error.c_str(), auth.c_str(), b64str.c_str(), username.c_str(), |
| + userpass.c_str(), password.c_str(), request.all_headers.c_str())); |
| + return http_response.Pass(); |
| + } |
| + |
| + if (request.headers.find("If-None-Match") != request.headers.end() && |
| + request.headers.at("If-None-Match") == kEtag) { |
| + http_response->set_code(HTTP_NOT_MODIFIED); |
| + return http_response.Pass(); |
| + } |
| + |
| + base::FilePath file_path = |
| + base::FilePath().AppendASCII(request.relative_url.substr(1)); |
| + if (file_path.FinalExtension() == FILE_PATH_LITERAL("gif")) { |
| + base::FilePath server_root; |
| + PathService::Get(base::DIR_SOURCE_ROOT, &server_root); |
| + base::FilePath gif_path = server_root.AppendASCII(kLogoPath); |
| + std::string gif_data; |
| + base::ReadFileToString(gif_path, &gif_data); |
| + http_response->set_content_type("image/gif"); |
| + http_response->set_content(gif_data); |
| + } else { |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content( |
| + base::StringPrintf("<html><head><title>%s/%s</title></head>" |
| + "<body>auth=%s<p>You sent:<br>%s<p></body></html>", |
| + username.c_str(), password.c_str(), auth.c_str(), |
| + request.all_headers.c_str())); |
| + } |
| + |
| + http_response->AddCustomHeader("Cache-Control", "max-age=60000"); |
| + http_response->AddCustomHeader("Etag", kEtag); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleAuthDigest(const HttpRequest& request) { |
| + std::string nonce = base::MD5String( |
| + base::StringPrintf("privatekey%s", request.relative_url.c_str())); |
| + std::string opaque = base::MD5String("opaque"); |
| + std::string password = kDefaultPassword; |
| + std::string realm = kDefaultRealm; |
| + |
| + bool authed = false; |
| + std::string error; |
| + std::string auth; |
| + std::string digest_str = "Digest"; |
| + std::string username; |
| + if (request.headers.find("Authorization") == request.headers.end()) { |
| + error = "no auth"; |
| + } else if (request.headers.at("Authorization").substr(0, digest_str.size()) != |
| + digest_str) { |
| + error = "not digest"; |
| + } else { |
| + auth = request.headers.at("Authorization").substr(digest_str.size() + 1); |
| + |
| + std::map<std::string, std::string> auth_pairs; |
| + base::StringPairs auth_vector; |
| + base::SplitStringIntoKeyValuePairs(auth, '=', ',', &auth_vector); |
| + for (const auto& auth_pair : auth_vector) { |
| + std::string key; |
| + std::string value; |
| + base::TrimWhitespaceASCII(auth_pair.first, base::TRIM_ALL, &key); |
| + base::TrimWhitespaceASCII(auth_pair.second, base::TRIM_ALL, &value); |
| + if (value.substr(0, 1) == "\"" && value.substr(value.size() - 1) == "\"") |
|
mmenke
2015/10/30 15:26:35
Just use "at" instead of substr?
svaldez
2015/10/30 15:57:40
Done.
|
| + value = value.substr(1, value.size() - 2); |
|
mmenke
2015/10/30 15:26:35
Should handle size() <= 1 here and above (Normally
svaldez
2015/10/30 15:57:40
Done.
|
| + auth_pairs[key] = value; |
| + } |
| + |
| + if (auth_pairs["nonce"] != nonce) { |
| + error = "wrong nonce"; |
| + } else if (auth_pairs["opaque"] != opaque) { |
| + error = "wrong opaque"; |
| + } else { |
| + username = auth_pairs["username"]; |
| + |
| + std::string hash1 = base::MD5String( |
| + base::StringPrintf("%s:%s:%s", auth_pairs["username"].c_str(), |
| + realm.c_str(), password.c_str())); |
| + std::string hash2 = base::MD5String(base::StringPrintf( |
| + "%s:%s", request.method_string.c_str(), auth_pairs["uri"].c_str())); |
| + |
| + std::string response; |
| + if (auth_pairs.find("qop") != auth_pairs.end() && |
| + auth_pairs.find("nc") != auth_pairs.end() && |
| + auth_pairs.find("cnonce") != auth_pairs.end()) { |
| + response = base::MD5String(base::StringPrintf( |
| + "%s:%s:%s:%s:%s:%s", hash1.c_str(), nonce.c_str(), |
| + auth_pairs["nc"].c_str(), auth_pairs["cnonce"].c_str(), |
| + auth_pairs["qop"].c_str(), hash2.c_str())); |
| + } else { |
| + response = base::MD5String(base::StringPrintf( |
| + "%s:%s:%s", hash1.c_str(), nonce.c_str(), hash2.c_str())); |
| + } |
| + |
| + if (auth_pairs["response"] == response) |
| + authed = true; |
| + else |
| + error = "wrong password"; |
| + } |
| + } |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + if (!authed) { |
| + http_response->set_code(HTTP_UNAUTHORIZED); |
| + http_response->set_content_type("text/html"); |
| + std::string auth_header = base::StringPrintf( |
| + "Digest realm=\"%s\", " |
| + "domain=\"/\", qop=\"auth\", algorithm=MD5, nonce=\"%s\", " |
| + "opaque=\"%s\"", |
| + realm.c_str(), nonce.c_str(), opaque.c_str()); |
| + http_response->AddCustomHeader("WWW-Authenticate", auth_header); |
| + http_response->set_content(base::StringPrintf( |
| + "<html><head><title>Denied: %s</title></head>" |
| + "<body>auth=%s<p>" |
| + "You sent:<br>%s<p>We are replying:<br>%s<p></body></html>", |
| + error.c_str(), auth.c_str(), request.all_headers.c_str(), |
| + auth_header.c_str())); |
| + return http_response.Pass(); |
| + } |
| + |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content( |
| + base::StringPrintf("<html><head><title>%s/%s</title></head>" |
| + "<body>auth=%s<p></body></html>", |
| + username.c_str(), password.c_str(), auth.c_str())); |
| + |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleServerRedirect(const HttpRequest& request) { |
| + GURL request_url = request.GetURL(); |
| + std::string dest = |
| + net::UnescapeURLComponent(request_url.query(), kUnescapeAll); |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_code(HTTP_MOVED_PERMANENTLY); |
| + http_response->AddCustomHeader("Location", dest); |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content(base::StringPrintf( |
| + "<html><head></head><body>Redirecting to %s</body></html>", |
| + dest.c_str())); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleCrossSiteRedirect(EmbeddedTestServer* server, |
| + const HttpRequest& request) { |
| + if (!ShouldHandle(request, "/cross-site")) |
| + return nullptr; |
| + |
| + std::string dest_all = net::UnescapeURLComponent( |
| + request.relative_url.substr(std::string("/cross-site").size() + 1), |
| + kUnescapeAll); |
| + |
| + std::string dest = base::StringPrintf( |
| + "//%s:%hu/%s", dest_all.substr(0, dest_all.find("/")).c_str(), |
| + server->port(), dest_all.substr(dest_all.find("/") + 1).c_str()); |
|
mmenke
2015/10/30 15:26:35
Again, should handle "/" not appearing in the stri
svaldez
2015/10/30 15:57:40
Done.
|
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_code(HTTP_MOVED_PERMANENTLY); |
| + http_response->AddCustomHeader("Location", dest); |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content(base::StringPrintf( |
| + "<html><head></head><body>Redirecting to %s</body></html>", |
| + dest.c_str())); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleClientRedirect(const HttpRequest& request) { |
| + GURL request_url = request.GetURL(); |
| + std::string dest = |
| + net::UnescapeURLComponent(request_url.query(), kUnescapeAll); |
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content(base::StringPrintf( |
| + "<html><head><meta http-equiv=\"refresh\" content=\"0;url=%s\"></head>" |
| + "<body>Redirecting to %s</body></html>", |
| + dest.c_str(), dest.c_str())); |
| + return http_response.Pass(); |
| +} |
| + |
| +scoped_ptr<HttpResponse> HandleDefaultResponse(const HttpRequest& request) { |
| + scoped_ptr<BasicHttpResponse> http_response(new BasicHttpResponse); |
| + http_response->set_content_type("text/html"); |
| + http_response->set_content("Default response given for path: " + |
| + request.relative_url); |
| + return http_response.Pass(); |
| +} |
| + |
| +class DelayedHttpResponse : public BasicHttpResponse { |
|
mmenke
2015/10/30 15:26:35
Think this class is worth a comment.
svaldez
2015/10/30 15:57:40
Done.
|
| + public: |
| + DelayedHttpResponse(double delay) : delay_(delay) {} |
|
mmenke
2015/10/30 15:26:35
explicit
svaldez
2015/10/30 15:57:40
Done.
|
| + |
| + void SendResponse(const SendBytesCallback& send, |
| + const SendCompleteCallback& done) override { |
| + base::ThreadTaskRunnerHandle::Get()->PostDelayedTask( |
| + FROM_HERE, base::Bind(send, ToResponseString(), done), |
| + base::TimeDelta::FromSecondsD(delay_)); |
| + } |
| + |
| + private: |
| + double delay_; |
|
mmenke
2015/10/30 15:26:34
nit: const?
mmenke
2015/10/30 15:26:35
DISALLOW_COPY_AND_ASSIGN
svaldez
2015/10/30 15:57:40
Done.
svaldez
2015/10/30 15:57:40
Done.
|
| +}; |
| + |
| +scoped_ptr<HttpResponse> HandleSlowServer(const HttpRequest& request) { |
|
mmenke
2015/10/30 15:26:34
Think this method is worth a comment. Should prob
svaldez
2015/10/30 15:57:40
Done.
|
| + double delay = 1.0f; |
| + |
| + GURL request_url = request.GetURL(); |
| + if (request_url.has_query()) { |
| + delay = std::atof(request_url.query().c_str()); |
| + } |
|
mmenke
2015/10/30 15:26:35
nit: Remove braces
svaldez
2015/10/30 15:57:40
Done.
|
| + |
| + scoped_ptr<BasicHttpResponse> http_response(new DelayedHttpResponse(delay)); |
| + http_response->set_content_type("text/plain"); |
| + http_response->set_content(base::StringPrintf("waited %.1f seconds", delay)); |
| + return http_response.Pass(); |
| +} |
| + |
| +} // namespace anonymous |
| + |
| +#define PREFIXED_HANDLER(prefix, handler) \ |
| + base::Bind(&HandlePrefixedRequest, prefix, base::Bind(handler)) |
| + |
| +void RegisterDefaultHandlers(EmbeddedTestServer* server) { |
| + server->RegisterDefaultHandler(base::Bind(&HandleDefaultConnect)); |
| + |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/cachetime", &HandleCacheTime)); |
| + server->RegisterDefaultHandler( |
| + base::Bind(&HandleEchoHeader, "/echoheader", "no-cache")); |
| + server->RegisterDefaultHandler( |
| + base::Bind(&HandleEchoHeader, "/echoheadercache", "max-age=60000")); |
| + server->RegisterDefaultHandler(PREFIXED_HANDLER("/echo", &HandleEcho)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/echotitle", &HandleEchoTitle)); |
| + server->RegisterDefaultHandler(PREFIXED_HANDLER("/echoall", &HandleEchoAll)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/set-cookie", &HandleSetCookie)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/set-many-cookies", &HandleSetManyCookies)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/expect-and-set-cookie", &HandleExpectAndSetCookie)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/set-header", &HandleSetHeader)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/nocontent", &HandleNoContent)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/close-socket", &HandleCloseSocket)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/auth-basic", &HandleAuthBasic)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/auth-digest", &HandleAuthDigest)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/server-redirect", &HandleServerRedirect)); |
| + server->RegisterDefaultHandler(base::Bind(&HandleCrossSiteRedirect, server)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/client-redirect", &HandleClientRedirect)); |
| + server->RegisterDefaultHandler( |
| + PREFIXED_HANDLER("/defaultresponse", &HandleDefaultResponse)); |
| + server->RegisterDefaultHandler(PREFIXED_HANDLER("/slow", &HandleSlowServer)); |
| + |
| + // TODO(svaldez): HandleDownload |
| + // TODO(svaldez): HandleDownloadFinish |
| + // TODO(svaldez): HandleZipFile |
| + // TODO(svaldez): HandleRangeReset |
| + // TODO(svaldez): HandleSSLManySmallRecords |
| + // TODO(svaldez): HandleChunkedServer |
| + // TODO(svaldez): HandleGetSSLSessionCache |
| + // TODO(svaldez): HandleGetChannelID |
| + // TODO(svaldez): HandleGetClientCert |
| + // TODO(svaldez): HandleClientCipherList |
| + // TODO(svaldez): HandleEchoMultipartPost |
| +} |
| + |
| +#undef PREFIXED_HANDLER |
| + |
| +} // namespace test_server |
| +} // namespace net |