OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/http/http_auth_handler_negotiate.h" | 5 #include "net/http/http_auth_handler_negotiate.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/strings/string_util.h" | 9 #include "base/strings/string_util.h" |
10 #include "base/strings/utf_string_conversions.h" | 10 #include "base/strings/utf_string_conversions.h" |
(...skipping 27 matching lines...) Expand all Loading... | |
38 void SetUp() override { | 38 void SetUp() override { |
39 auth_library_ = new MockAuthLibrary(); | 39 auth_library_ = new MockAuthLibrary(); |
40 resolver_.reset(new MockHostResolver()); | 40 resolver_.reset(new MockHostResolver()); |
41 resolver_->rules()->AddIPLiteralRule("alias", "10.0.0.2", | 41 resolver_->rules()->AddIPLiteralRule("alias", "10.0.0.2", |
42 "canonical.example.com"); | 42 "canonical.example.com"); |
43 | 43 |
44 url_security_manager_.reset(new MockAllowURLSecurityManager()); | 44 url_security_manager_.reset(new MockAllowURLSecurityManager()); |
45 factory_.reset(new HttpAuthHandlerNegotiate::Factory()); | 45 factory_.reset(new HttpAuthHandlerNegotiate::Factory()); |
46 factory_->set_url_security_manager(url_security_manager_.get()); | 46 factory_->set_url_security_manager(url_security_manager_.get()); |
47 #if defined(OS_ANDROID) | 47 #if defined(OS_ANDROID) |
48 std::string* authenticator = | 48 scoped_ptr<std::string> authenticator( |
49 new std::string("org.chromium.test.DummySpnegoAuthenticator"); | 49 new std::string("org.chromium.test.DummySpnegoAuthenticator")); |
50 factory_->set_library(authenticator); | 50 factory_->set_library(authenticator.Pass()); |
51 MockAuthLibrary::EnsureTestAccountExists(); | 51 MockAuthLibrary::EnsureTestAccountExists(); |
52 #endif | 52 #endif |
53 #if defined(OS_WIN) || (defined(OS_POSIX) && !defined(OS_ANDROID)) | 53 #if defined(OS_WIN) || (defined(OS_POSIX) && !defined(OS_ANDROID)) |
54 factory_->set_library(auth_library_); | 54 factory_->set_library(make_scoped_ptr(auth_library_)); |
asanka
2015/10/28 03:27:43
Preexisting: This is dangerous territory. Can we a
aberent
2015/11/02 18:52:50
Not without significant refactoring of the tests (
| |
55 #endif | 55 #endif |
56 factory_->set_host_resolver(resolver_.get()); | 56 factory_->set_host_resolver(resolver_.get()); |
57 } | 57 } |
58 | 58 |
59 #if defined(OS_ANDROID) | 59 #if defined(OS_ANDROID) |
60 void TearDown() override { MockAuthLibrary::RemoveTestAccounts(); } | 60 void TearDown() override { MockAuthLibrary::RemoveTestAccounts(); } |
61 #endif | 61 #endif |
62 | 62 |
63 void SetupMocks(MockAuthLibrary* mock_library) { | 63 void SetupMocks(MockAuthLibrary* mock_library) { |
64 #if defined(OS_WIN) | 64 #if defined(OS_WIN) |
(...skipping 152 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
217 handler->reset(negotiate_handler); | 217 handler->reset(negotiate_handler); |
218 return rv; | 218 return rv; |
219 } | 219 } |
220 | 220 |
221 MockAuthLibrary* AuthLibrary() { return auth_library_; } | 221 MockAuthLibrary* AuthLibrary() { return auth_library_; } |
222 | 222 |
223 private: | 223 private: |
224 #if defined(OS_WIN) | 224 #if defined(OS_WIN) |
225 scoped_ptr<SecPkgInfoW> security_package_; | 225 scoped_ptr<SecPkgInfoW> security_package_; |
226 #endif | 226 #endif |
227 // |auth_library_| is passed to |factory_|, which assumes ownership of it. | 227 // |auth_library_| is passed to |factory_|, which assumes ownership of it, but |
228 // can't be a scoped pointer to it since the tests need access when they set | |
229 // up the mocks after passing ownership. | |
228 MockAuthLibrary* auth_library_; | 230 MockAuthLibrary* auth_library_; |
229 scoped_ptr<MockHostResolver> resolver_; | 231 scoped_ptr<MockHostResolver> resolver_; |
230 scoped_ptr<URLSecurityManager> url_security_manager_; | 232 scoped_ptr<URLSecurityManager> url_security_manager_; |
231 scoped_ptr<HttpAuthHandlerNegotiate::Factory> factory_; | 233 scoped_ptr<HttpAuthHandlerNegotiate::Factory> factory_; |
232 }; | 234 }; |
233 | 235 |
234 TEST_F(HttpAuthHandlerNegotiateTest, DisableCname) { | 236 TEST_F(HttpAuthHandlerNegotiateTest, DisableCname) { |
235 SetupMocks(AuthLibrary()); | 237 SetupMocks(AuthLibrary()); |
236 scoped_ptr<HttpAuthHandlerNegotiate> auth_handler; | 238 scoped_ptr<HttpAuthHandlerNegotiate> auth_handler; |
237 EXPECT_EQ(OK, CreateHandler( | 239 EXPECT_EQ(OK, CreateHandler( |
(...skipping 121 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
359 | 361 |
360 #if defined(DLOPEN_KERBEROS) | 362 #if defined(DLOPEN_KERBEROS) |
361 TEST_F(HttpAuthHandlerNegotiateTest, MissingGSSAPI) { | 363 TEST_F(HttpAuthHandlerNegotiateTest, MissingGSSAPI) { |
362 scoped_ptr<HostResolver> host_resolver(new MockHostResolver()); | 364 scoped_ptr<HostResolver> host_resolver(new MockHostResolver()); |
363 MockAllowURLSecurityManager url_security_manager; | 365 MockAllowURLSecurityManager url_security_manager; |
364 scoped_ptr<HttpAuthHandlerNegotiate::Factory> negotiate_factory( | 366 scoped_ptr<HttpAuthHandlerNegotiate::Factory> negotiate_factory( |
365 new HttpAuthHandlerNegotiate::Factory()); | 367 new HttpAuthHandlerNegotiate::Factory()); |
366 negotiate_factory->set_host_resolver(host_resolver.get()); | 368 negotiate_factory->set_host_resolver(host_resolver.get()); |
367 negotiate_factory->set_url_security_manager(&url_security_manager); | 369 negotiate_factory->set_url_security_manager(&url_security_manager); |
368 negotiate_factory->set_library( | 370 negotiate_factory->set_library( |
369 new GSSAPISharedLibrary("/this/library/does/not/exist")); | 371 make_scoped_ptr(new GSSAPISharedLibrary("/this/library/does/not/exist"))); |
370 | 372 |
371 GURL gurl("http://www.example.com"); | 373 GURL gurl("http://www.example.com"); |
372 scoped_ptr<HttpAuthHandler> generic_handler; | 374 scoped_ptr<HttpAuthHandler> generic_handler; |
373 int rv = negotiate_factory->CreateAuthHandlerFromString( | 375 int rv = negotiate_factory->CreateAuthHandlerFromString( |
374 "Negotiate", | 376 "Negotiate", |
375 HttpAuth::AUTH_SERVER, | 377 HttpAuth::AUTH_SERVER, |
376 gurl, | 378 gurl, |
377 BoundNetLog(), | 379 BoundNetLog(), |
378 &generic_handler); | 380 &generic_handler); |
379 EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, rv); | 381 EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, rv); |
380 EXPECT_TRUE(generic_handler.get() == NULL); | 382 EXPECT_TRUE(generic_handler.get() == NULL); |
381 } | 383 } |
382 #endif // defined(DLOPEN_KERBEROS) | 384 #endif // defined(DLOPEN_KERBEROS) |
383 | 385 |
384 #endif // defined(OS_POSIX) | 386 #endif // defined(OS_POSIX) |
385 | 387 |
386 } // namespace net | 388 } // namespace net |
OLD | NEW |