Index: net/http/http_auth_handler_factory_unittest.cc |
diff --git a/net/http/http_auth_handler_factory_unittest.cc b/net/http/http_auth_handler_factory_unittest.cc |
index b73e47b8961ef38af0847762359412b41a7132c1..6d851211670e28a68257d30b9af1303ae4500f84 100644 |
--- a/net/http/http_auth_handler_factory_unittest.cc |
+++ b/net/http/http_auth_handler_factory_unittest.cc |
@@ -10,6 +10,7 @@ |
#include "net/http/http_auth_scheme.h" |
#include "net/http/mock_allow_http_auth_preferences.h" |
#include "net/http/url_security_manager.h" |
+#include "net/ssl/ssl_info.h" |
#include "testing/gtest/include/gtest/gtest.h" |
namespace net { |
@@ -24,6 +25,7 @@ class MockHttpAuthHandlerFactory : public HttpAuthHandlerFactory { |
int CreateAuthHandler(HttpAuthChallengeTokenizer* challenge, |
HttpAuth::Target target, |
+ const SSLInfo& ssl_info, |
const GURL& origin, |
CreateReason reason, |
int nonce_count, |
@@ -40,6 +42,7 @@ class MockHttpAuthHandlerFactory : public HttpAuthHandlerFactory { |
} // namespace |
TEST(HttpAuthHandlerFactoryTest, RegistryFactory) { |
+ SSLInfo null_ssl_info; |
HttpAuthHandlerRegistryFactory registry_factory; |
GURL gurl("www.google.com"); |
const int kBasicReturnCode = ERR_INVALID_SPDY_STREAM; |
@@ -59,42 +62,43 @@ TEST(HttpAuthHandlerFactoryTest, RegistryFactory) { |
// No schemes should be supported in the beginning. |
EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, |
registry_factory.CreateAuthHandlerFromString( |
- "Basic", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), &handler)); |
+ "Basic", HttpAuth::AUTH_SERVER, null_ssl_info, gurl, |
+ BoundNetLog(), &handler)); |
// Test what happens with a single scheme. |
registry_factory.RegisterSchemeFactory("Basic", mock_factory_basic); |
- EXPECT_EQ(kBasicReturnCode, |
- registry_factory.CreateAuthHandlerFromString( |
- "Basic", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), &handler)); |
+ EXPECT_EQ(kBasicReturnCode, registry_factory.CreateAuthHandlerFromString( |
+ "Basic", HttpAuth::AUTH_SERVER, null_ssl_info, |
+ gurl, BoundNetLog(), &handler)); |
EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, |
registry_factory.CreateAuthHandlerFromString( |
- "Digest", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), |
- &handler)); |
+ "Digest", HttpAuth::AUTH_SERVER, null_ssl_info, gurl, |
+ BoundNetLog(), &handler)); |
// Test multiple schemes |
registry_factory.RegisterSchemeFactory("Digest", mock_factory_digest); |
- EXPECT_EQ(kBasicReturnCode, |
- registry_factory.CreateAuthHandlerFromString( |
- "Basic", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), &handler)); |
+ EXPECT_EQ(kBasicReturnCode, registry_factory.CreateAuthHandlerFromString( |
+ "Basic", HttpAuth::AUTH_SERVER, null_ssl_info, |
+ gurl, BoundNetLog(), &handler)); |
EXPECT_EQ(kDigestReturnCode, |
registry_factory.CreateAuthHandlerFromString( |
- "Digest", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), |
- &handler)); |
+ "Digest", HttpAuth::AUTH_SERVER, null_ssl_info, gurl, |
+ BoundNetLog(), &handler)); |
// Test case-insensitivity |
- EXPECT_EQ(kBasicReturnCode, |
- registry_factory.CreateAuthHandlerFromString( |
- "basic", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), &handler)); |
+ EXPECT_EQ(kBasicReturnCode, registry_factory.CreateAuthHandlerFromString( |
+ "basic", HttpAuth::AUTH_SERVER, null_ssl_info, |
+ gurl, BoundNetLog(), &handler)); |
// Test replacement of existing auth scheme |
registry_factory.RegisterSchemeFactory("Digest", mock_factory_digest_replace); |
- EXPECT_EQ(kBasicReturnCode, |
- registry_factory.CreateAuthHandlerFromString( |
- "Basic", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), &handler)); |
+ EXPECT_EQ(kBasicReturnCode, registry_factory.CreateAuthHandlerFromString( |
+ "Basic", HttpAuth::AUTH_SERVER, null_ssl_info, |
+ gurl, BoundNetLog(), &handler)); |
EXPECT_EQ(kDigestReturnCodeReplace, |
registry_factory.CreateAuthHandlerFromString( |
- "Digest", HttpAuth::AUTH_SERVER, gurl, BoundNetLog(), |
- &handler)); |
+ "Digest", HttpAuth::AUTH_SERVER, null_ssl_info, gurl, |
+ BoundNetLog(), &handler)); |
} |
TEST(HttpAuthHandlerFactoryTest, DefaultFactory) { |
@@ -106,14 +110,12 @@ TEST(HttpAuthHandlerFactoryTest, DefaultFactory) { |
&http_auth_preferences); |
GURL server_origin("http://www.example.com"); |
GURL proxy_origin("http://cache.example.com:3128"); |
+ SSLInfo null_ssl_info; |
{ |
scoped_ptr<HttpAuthHandler> handler; |
int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
- "Basic realm=\"FooBar\"", |
- HttpAuth::AUTH_SERVER, |
- server_origin, |
- BoundNetLog(), |
- &handler); |
+ "Basic realm=\"FooBar\"", HttpAuth::AUTH_SERVER, null_ssl_info, |
+ server_origin, BoundNetLog(), &handler); |
EXPECT_EQ(OK, rv); |
ASSERT_FALSE(handler.get() == NULL); |
EXPECT_EQ(HttpAuth::AUTH_SCHEME_BASIC, handler->auth_scheme()); |
@@ -125,22 +127,16 @@ TEST(HttpAuthHandlerFactoryTest, DefaultFactory) { |
{ |
scoped_ptr<HttpAuthHandler> handler; |
int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
- "UNSUPPORTED realm=\"FooBar\"", |
- HttpAuth::AUTH_SERVER, |
- server_origin, |
- BoundNetLog(), |
- &handler); |
+ "UNSUPPORTED realm=\"FooBar\"", HttpAuth::AUTH_SERVER, null_ssl_info, |
+ server_origin, BoundNetLog(), &handler); |
EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, rv); |
EXPECT_TRUE(handler.get() == NULL); |
} |
{ |
scoped_ptr<HttpAuthHandler> handler; |
int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
- "Digest realm=\"FooBar\", nonce=\"xyz\"", |
- HttpAuth::AUTH_PROXY, |
- proxy_origin, |
- BoundNetLog(), |
- &handler); |
+ "Digest realm=\"FooBar\", nonce=\"xyz\"", HttpAuth::AUTH_PROXY, |
+ null_ssl_info, proxy_origin, BoundNetLog(), &handler); |
EXPECT_EQ(OK, rv); |
ASSERT_FALSE(handler.get() == NULL); |
EXPECT_EQ(HttpAuth::AUTH_SCHEME_DIGEST, handler->auth_scheme()); |
@@ -152,11 +148,8 @@ TEST(HttpAuthHandlerFactoryTest, DefaultFactory) { |
{ |
scoped_ptr<HttpAuthHandler> handler; |
int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
- "NTLM", |
- HttpAuth::AUTH_SERVER, |
- server_origin, |
- BoundNetLog(), |
- &handler); |
+ "NTLM", HttpAuth::AUTH_SERVER, null_ssl_info, server_origin, |
+ BoundNetLog(), &handler); |
EXPECT_EQ(OK, rv); |
ASSERT_FALSE(handler.get() == NULL); |
EXPECT_EQ(HttpAuth::AUTH_SCHEME_NTLM, handler->auth_scheme()); |
@@ -168,11 +161,8 @@ TEST(HttpAuthHandlerFactoryTest, DefaultFactory) { |
{ |
scoped_ptr<HttpAuthHandler> handler; |
int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
- "Negotiate", |
- HttpAuth::AUTH_SERVER, |
- server_origin, |
- BoundNetLog(), |
- &handler); |
+ "Negotiate", HttpAuth::AUTH_SERVER, null_ssl_info, server_origin, |
+ BoundNetLog(), &handler); |
// Note the default factory doesn't support Kerberos on Android |
#if defined(USE_KERBEROS) && !defined(OS_ANDROID) |
EXPECT_EQ(OK, rv); |