| Index: net/base/test_proxy_delegate.cc
|
| diff --git a/net/base/test_proxy_delegate.cc b/net/base/test_proxy_delegate.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..d4a3c61712f13e98eaa13454dc24fffa76627681
|
| --- /dev/null
|
| +++ b/net/base/test_proxy_delegate.cc
|
| @@ -0,0 +1,86 @@
|
| +// Copyright 2016 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "net/base/test_proxy_delegate.h"
|
| +
|
| +#include "net/http/http_request_headers.h"
|
| +#include "net/http/http_response_headers.h"
|
| +#include "testing/gtest/include/gtest/gtest.h"
|
| +
|
| +namespace net {
|
| +
|
| +TestProxyDelegate::TestProxyDelegate()
|
| + : on_before_tunnel_request_called_(false),
|
| + on_tunnel_request_completed_called_(false),
|
| + on_tunnel_headers_received_called_(false) {}
|
| +
|
| +TestProxyDelegate::~TestProxyDelegate() {}
|
| +
|
| +void TestProxyDelegate::VerifyOnTunnelRequestCompleted(
|
| + const std::string& endpoint,
|
| + const std::string& proxy_server) const {
|
| + EXPECT_TRUE(on_tunnel_request_completed_called_);
|
| + EXPECT_TRUE(HostPortPair::FromString(endpoint).Equals(
|
| + on_tunnel_request_completed_endpoint_));
|
| + EXPECT_TRUE(HostPortPair::FromString(proxy_server)
|
| + .Equals(on_tunnel_request_completed_proxy_server_));
|
| +}
|
| +
|
| +void TestProxyDelegate::VerifyOnTunnelHeadersReceived(
|
| + const std::string& origin,
|
| + const std::string& proxy_server,
|
| + const std::string& status_line) const {
|
| + EXPECT_TRUE(on_tunnel_headers_received_called_);
|
| + EXPECT_TRUE(HostPortPair::FromString(origin).Equals(
|
| + on_tunnel_headers_received_origin_));
|
| + EXPECT_TRUE(HostPortPair::FromString(proxy_server)
|
| + .Equals(on_tunnel_headers_received_proxy_server_));
|
| + EXPECT_EQ(status_line, on_tunnel_headers_received_status_line_);
|
| +}
|
| +
|
| +void TestProxyDelegate::OnResolveProxy(const GURL& url,
|
| + int load_flags,
|
| + const ProxyService& proxy_service,
|
| + ProxyInfo* result) {}
|
| +
|
| +void TestProxyDelegate::OnTunnelConnectCompleted(
|
| + const HostPortPair& endpoint,
|
| + const HostPortPair& proxy_server,
|
| + int net_error) {
|
| + on_tunnel_request_completed_called_ = true;
|
| + on_tunnel_request_completed_endpoint_ = endpoint;
|
| + on_tunnel_request_completed_proxy_server_ = proxy_server;
|
| +}
|
| +
|
| +void TestProxyDelegate::OnFallback(const ProxyServer& bad_proxy,
|
| + int net_error) {}
|
| +
|
| +void TestProxyDelegate::OnBeforeSendHeaders(URLRequest* request,
|
| + const ProxyInfo& proxy_info,
|
| + HttpRequestHeaders* headers) {}
|
| +
|
| +void TestProxyDelegate::OnBeforeTunnelRequest(
|
| + const HostPortPair& proxy_server,
|
| + HttpRequestHeaders* extra_headers) {
|
| + on_before_tunnel_request_called_ = true;
|
| + if (extra_headers)
|
| + extra_headers->SetHeader("Foo", proxy_server.ToString());
|
| +}
|
| +
|
| +void TestProxyDelegate::OnTunnelHeadersReceived(
|
| + const HostPortPair& origin,
|
| + const HostPortPair& proxy_server,
|
| + const HttpResponseHeaders& response_headers) {
|
| + on_tunnel_headers_received_called_ = true;
|
| + on_tunnel_headers_received_origin_ = origin;
|
| + on_tunnel_headers_received_proxy_server_ = proxy_server;
|
| + on_tunnel_headers_received_status_line_ = response_headers.GetStatusLine();
|
| +}
|
| +
|
| +bool TestProxyDelegate::IsTrustedSpdyProxy(
|
| + const net::ProxyServer& proxy_server) {
|
| + return proxy_server.is_valid() && trusted_spdy_proxy_ == proxy_server;
|
| +}
|
| +
|
| +} // namespace net
|
|
|