Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/loader/mime_type_resource_handler.h" | 5 #include "content/browser/loader/mime_sniffing_resource_handler.h" |
| 6 | 6 |
| 7 #include <stdint.h> | 7 #include <stdint.h> |
| 8 | 8 |
| 9 #include <memory> | 9 #include <memory> |
| 10 | 10 |
| 11 #include "base/files/file_path.h" | 11 #include "base/files/file_path.h" |
| 12 #include "base/location.h" | 12 #include "base/location.h" |
| 13 #include "base/logging.h" | 13 #include "base/logging.h" |
| 14 #include "base/macros.h" | 14 #include "base/macros.h" |
| 15 #include "base/single_thread_task_runner.h" | 15 #include "base/single_thread_task_runner.h" |
| 16 #include "base/threading/thread_task_runner_handle.h" | 16 #include "base/threading/thread_task_runner_handle.h" |
| 17 #include "content/browser/loader/intercepting_resource_handler.h" | |
| 17 #include "content/browser/loader/resource_dispatcher_host_impl.h" | 18 #include "content/browser/loader/resource_dispatcher_host_impl.h" |
| 18 #include "content/public/browser/resource_controller.h" | 19 #include "content/public/browser/resource_controller.h" |
| 19 #include "content/public/browser/resource_dispatcher_host_delegate.h" | 20 #include "content/public/browser/resource_dispatcher_host_delegate.h" |
| 20 #include "content/public/browser/resource_request_info.h" | 21 #include "content/public/browser/resource_request_info.h" |
| 21 #include "content/public/common/resource_response.h" | 22 #include "content/public/common/resource_response.h" |
| 22 #include "content/public/common/webplugininfo.h" | 23 #include "content/public/common/webplugininfo.h" |
| 23 #include "content/public/test/test_browser_thread_bundle.h" | 24 #include "content/public/test/test_browser_thread_bundle.h" |
| 24 #include "content/public/test/test_utils.h" | 25 #include "content/public/test/test_utils.h" |
| 25 #include "content/test/fake_plugin_service.h" | 26 #include "content/test/fake_plugin_service.h" |
| 26 #include "net/url_request/url_request_context.h" | 27 #include "net/url_request/url_request_context.h" |
| 27 #include "testing/gtest/include/gtest/gtest.h" | 28 #include "testing/gtest/include/gtest/gtest.h" |
| 28 #include "url/gurl.h" | 29 #include "url/gurl.h" |
| 29 | 30 |
| 30 namespace content { | 31 namespace content { |
| 31 | 32 |
| 32 namespace { | 33 namespace { |
| 33 | 34 |
| 34 class TestResourceHandler : public ResourceHandler { | 35 class TestResourceHandler : public ResourceHandler { |
| 35 public: | 36 public: |
| 36 TestResourceHandler() : ResourceHandler(nullptr) {} | 37 TestResourceHandler(bool response_started_succeeds, |
| 38 bool defer_on_response_started, | |
| 39 bool will_read_succeeds, | |
| 40 bool read_completed_succeeds, | |
| 41 bool defer_on_read_completed) | |
| 42 : ResourceHandler(nullptr), | |
| 43 buffer_(new net::IOBuffer(2048)), | |
| 44 response_started_succeeds_(response_started_succeeds), | |
| 45 defer_on_response_started_(defer_on_response_started), | |
| 46 will_read_succeeds_(will_read_succeeds), | |
| 47 read_completed_succeeds_(read_completed_succeeds), | |
| 48 defer_on_read_completed_(defer_on_read_completed) {} | |
| 37 | 49 |
| 38 void SetController(ResourceController* controller) override {} | 50 void SetController(ResourceController* controller) override {} |
| 39 | 51 |
| 40 bool OnRequestRedirected(const net::RedirectInfo& redirect_info, | 52 bool OnRequestRedirected(const net::RedirectInfo& redirect_info, |
| 41 ResourceResponse* response, | 53 ResourceResponse* response, |
| 42 bool* defer) override { | 54 bool* defer) override { |
| 43 NOTREACHED(); | 55 NOTREACHED(); |
| 44 return false; | 56 return false; |
| 45 } | 57 } |
| 46 | 58 |
| 47 bool OnResponseStarted(ResourceResponse* response, bool* defer) override { | 59 bool OnResponseStarted(ResourceResponse* response, bool* defer) override { |
| 48 return false; | 60 if (defer_on_response_started_) |
| 61 *defer = true; | |
| 62 return response_started_succeeds_; | |
| 49 } | 63 } |
| 50 | 64 |
| 51 bool OnWillStart(const GURL& url, bool* defer) override { | 65 bool OnWillStart(const GURL& url, bool* defer) override { return false; } |
| 52 return false; | |
| 53 } | |
| 54 | 66 |
| 55 bool OnWillRead(scoped_refptr<net::IOBuffer>* buf, | 67 bool OnWillRead(scoped_refptr<net::IOBuffer>* buf, |
| 56 int* buf_size, | 68 int* buf_size, |
| 57 int min_size) override { | 69 int min_size) override { |
| 58 NOTREACHED(); | 70 *buf = buffer_; |
| 59 return false; | 71 *buf_size = 2048; |
| 72 return will_read_succeeds_; | |
| 60 } | 73 } |
| 61 | 74 |
| 62 bool OnReadCompleted(int bytes_read, bool* defer) override { | 75 bool OnReadCompleted(int bytes_read, bool* defer) override { |
| 63 NOTREACHED(); | 76 DCHECK_LT(bytes_read, 2048); |
| 64 return false; | 77 if (defer_on_read_completed_) |
| 78 *defer = true; | |
| 79 return read_completed_succeeds_; | |
| 65 } | 80 } |
| 66 | 81 |
| 67 void OnResponseCompleted(const net::URLRequestStatus& status, | 82 void OnResponseCompleted(const net::URLRequestStatus& status, |
| 68 const std::string& security_info, | 83 const std::string& security_info, |
| 69 bool* defer) override { | 84 bool* defer) override {} |
| 70 } | |
| 71 | 85 |
| 72 void OnDataDownloaded(int bytes_downloaded) override { | 86 void OnDataDownloaded(int bytes_downloaded) override { NOTREACHED(); } |
| 73 NOTREACHED(); | 87 |
| 88 scoped_refptr<net::IOBuffer> buffer() { return buffer_; } | |
| 89 | |
| 90 private: | |
| 91 scoped_refptr<net::IOBuffer> buffer_; | |
| 92 bool response_started_succeeds_; | |
| 93 bool defer_on_response_started_; | |
| 94 bool will_read_succeeds_; | |
| 95 bool read_completed_succeeds_; | |
| 96 bool defer_on_read_completed_; | |
| 97 | |
| 98 DISALLOW_COPY_AND_ASSIGN(TestResourceHandler); | |
| 99 }; | |
| 100 | |
| 101 class TestResourceDispatcherHostDelegate | |
| 102 : public ResourceDispatcherHostDelegate { | |
| 103 public: | |
| 104 explicit TestResourceDispatcherHostDelegate(bool must_download) | |
| 105 : must_download_(must_download) {} | |
| 106 | |
| 107 bool ShouldForceDownloadResource(const GURL& url, | |
| 108 const std::string& mime_type) override { | |
| 109 return must_download_; | |
| 74 } | 110 } |
| 75 | 111 |
| 76 private: | 112 private: |
| 77 DISALLOW_COPY_AND_ASSIGN(TestResourceHandler); | 113 const bool must_download_; |
| 78 }; | 114 }; |
| 79 | 115 |
| 80 class TestResourceDispatcherHost : public ResourceDispatcherHostImpl { | 116 class TestResourceDispatcherHost : public ResourceDispatcherHostImpl { |
| 81 public: | 117 public: |
| 82 explicit TestResourceDispatcherHost(bool stream_has_handler) | 118 explicit TestResourceDispatcherHost(bool stream_has_handler) |
| 83 : stream_has_handler_(stream_has_handler), | 119 : stream_has_handler_(stream_has_handler), |
| 84 intercepted_as_stream_(false), | 120 intercepted_as_stream_(false), |
| 85 intercepted_as_stream_count_(0) {} | 121 intercepted_as_stream_count_(0), |
| 122 new_resource_handler_(nullptr) {} | |
| 86 | 123 |
| 87 bool intercepted_as_stream() const { return intercepted_as_stream_; } | 124 bool intercepted_as_stream() const { return intercepted_as_stream_; } |
| 88 | 125 |
| 89 std::unique_ptr<ResourceHandler> CreateResourceHandlerForDownload( | 126 std::unique_ptr<ResourceHandler> CreateResourceHandlerForDownload( |
| 90 net::URLRequest* request, | 127 net::URLRequest* request, |
| 91 bool is_content_initiated, | 128 bool is_content_initiated, |
| 92 bool must_download) override { | 129 bool must_download) override { |
| 93 return std::unique_ptr<ResourceHandler>(new TestResourceHandler); | 130 return CreateNewResourceHandler(); |
| 94 } | 131 } |
| 95 | 132 |
| 96 std::unique_ptr<ResourceHandler> MaybeInterceptAsStream( | 133 std::unique_ptr<ResourceHandler> MaybeInterceptAsStream( |
| 97 const base::FilePath& plugin_path, | 134 const base::FilePath& plugin_path, |
| 98 net::URLRequest* request, | 135 net::URLRequest* request, |
| 99 ResourceResponse* response, | 136 ResourceResponse* response, |
| 100 std::string* payload) override { | 137 std::string* payload) override { |
| 101 intercepted_as_stream_count_++; | 138 intercepted_as_stream_count_++; |
| 102 if (stream_has_handler_) { | 139 if (stream_has_handler_) |
| 103 intercepted_as_stream_ = true; | 140 intercepted_as_stream_ = true; |
| 104 return std::unique_ptr<ResourceHandler>(new TestResourceHandler); | 141 return CreateNewResourceHandler(); |
| 105 } else { | |
| 106 return std::unique_ptr<ResourceHandler>(); | |
| 107 } | |
| 108 } | 142 } |
| 109 | 143 |
| 110 int intercepted_as_stream_count() const { | 144 int intercepted_as_stream_count() const { |
| 111 return intercepted_as_stream_count_; | 145 return intercepted_as_stream_count_; |
| 112 } | 146 } |
| 113 | 147 |
| 148 TestResourceHandler* new_resource_handler() const { | |
| 149 return new_resource_handler_; | |
| 150 } | |
| 151 | |
| 114 private: | 152 private: |
| 153 std::unique_ptr<ResourceHandler> CreateNewResourceHandler() { | |
| 154 std::unique_ptr<TestResourceHandler> new_resource_handler( | |
| 155 new TestResourceHandler(false, false, true, true, false)); | |
| 156 new_resource_handler_ = new_resource_handler.get(); | |
| 157 return std::move(new_resource_handler); | |
| 158 } | |
| 159 | |
| 115 // Whether the URL request should be intercepted as a stream. | 160 // Whether the URL request should be intercepted as a stream. |
| 116 bool stream_has_handler_; | 161 bool stream_has_handler_; |
| 117 | 162 |
| 118 // Whether the URL request has been intercepted as a stream. | 163 // Whether the URL request has been intercepted as a stream. |
| 119 bool intercepted_as_stream_; | 164 bool intercepted_as_stream_; |
| 120 | 165 |
| 121 // Count of number of times MaybeInterceptAsStream function get called in a | 166 // Count of number of times MaybeInterceptAsStream function get called in a |
| 122 // test. | 167 // test. |
| 123 int intercepted_as_stream_count_; | 168 int intercepted_as_stream_count_; |
| 124 }; | |
| 125 | 169 |
| 126 class TestResourceDispatcherHostDelegate | 170 // The last alternative TestResourceHandler created by this |
| 127 : public ResourceDispatcherHostDelegate { | 171 // TestResourceDispatcherHost. |
| 128 public: | 172 TestResourceHandler* new_resource_handler_; |
| 129 TestResourceDispatcherHostDelegate(bool must_download) | |
| 130 : must_download_(must_download) { | |
| 131 } | |
| 132 | |
| 133 bool ShouldForceDownloadResource(const GURL& url, | |
| 134 const std::string& mime_type) override { | |
| 135 return must_download_; | |
| 136 } | |
| 137 | |
| 138 private: | |
| 139 const bool must_download_; | |
| 140 }; | |
| 141 | |
| 142 class TestResourceController : public ResourceController { | |
| 143 public: | |
| 144 void Cancel() override {} | |
| 145 | |
| 146 void CancelAndIgnore() override { | |
| 147 NOTREACHED(); | |
| 148 } | |
| 149 | |
| 150 void CancelWithError(int error_code) override { | |
| 151 NOTREACHED(); | |
| 152 } | |
| 153 | |
| 154 void Resume() override { | |
| 155 NOTREACHED(); | |
| 156 } | |
| 157 }; | 173 }; |
| 158 | 174 |
| 159 class TestFakePluginService : public FakePluginService { | 175 class TestFakePluginService : public FakePluginService { |
| 160 public: | 176 public: |
| 161 // If |is_plugin_stale| is true, GetPluginInfo will indicate the plugins are | 177 // If |is_plugin_stale| is true, GetPluginInfo will indicate the plugins are |
| 162 // stale until GetPlugins is called. | 178 // stale until GetPlugins is called. |
| 163 TestFakePluginService(bool plugin_available, bool is_plugin_stale) | 179 TestFakePluginService(bool plugin_available, bool is_plugin_stale) |
| 164 : plugin_available_(plugin_available), | 180 : plugin_available_(plugin_available), |
| 165 is_plugin_stale_(is_plugin_stale) {} | 181 is_plugin_stale_(is_plugin_stale) {} |
| 166 | 182 |
| (...skipping 23 matching lines...) Expand all Loading... | |
| 190 FROM_HERE, base::Bind(callback, plugins)); | 206 FROM_HERE, base::Bind(callback, plugins)); |
| 191 } | 207 } |
| 192 | 208 |
| 193 private: | 209 private: |
| 194 const bool plugin_available_; | 210 const bool plugin_available_; |
| 195 bool is_plugin_stale_; | 211 bool is_plugin_stale_; |
| 196 | 212 |
| 197 DISALLOW_COPY_AND_ASSIGN(TestFakePluginService); | 213 DISALLOW_COPY_AND_ASSIGN(TestFakePluginService); |
| 198 }; | 214 }; |
| 199 | 215 |
| 200 class MimeTypeResourceHandlerTest : public testing::Test { | 216 class TestResourceController : public ResourceController { |
| 201 public: | 217 public: |
| 202 MimeTypeResourceHandlerTest() | 218 TestResourceController() : cancel_call_count_(0), resume_call_count_(0) {} |
| 219 | |
| 220 void Cancel() override { cancel_call_count_++; } | |
| 221 | |
| 222 void CancelAndIgnore() override { NOTREACHED(); } | |
| 223 | |
| 224 void CancelWithError(int error_code) override { NOTREACHED(); } | |
| 225 | |
| 226 void Resume() override { resume_call_count_++; } | |
| 227 | |
| 228 int cancel_call_count() const { return cancel_call_count_; } | |
| 229 int resume_call_count() const { return resume_call_count_; } | |
| 230 | |
| 231 private: | |
| 232 int cancel_call_count_; | |
| 233 int resume_call_count_; | |
| 234 }; | |
| 235 | |
| 236 } // namespace | |
| 237 | |
| 238 class MimeSniffingResourceHandlerTest : public testing::Test { | |
| 239 public: | |
| 240 MimeSniffingResourceHandlerTest() | |
| 203 : stream_has_handler_(false), | 241 : stream_has_handler_(false), |
| 204 plugin_available_(false), | 242 plugin_available_(false), |
| 205 plugin_stale_(false) {} | 243 plugin_stale_(false) {} |
| 206 | 244 |
| 245 // Tests that the MimeSniffingHandler properly sets the accept field in the | |
| 246 // header. Returns the accept header value. | |
| 247 std::string TestAcceptHeaderSetting(ResourceType request_resource_type); | |
| 248 std::string TestAcceptHeaderSettingWithURLRequest( | |
| 249 ResourceType request_resource_type, | |
| 250 net::URLRequest* request); | |
| 251 | |
| 207 void set_stream_has_handler(bool stream_has_handler) { | 252 void set_stream_has_handler(bool stream_has_handler) { |
| 208 stream_has_handler_ = stream_has_handler; | 253 stream_has_handler_ = stream_has_handler; |
| 209 } | 254 } |
| 210 | 255 |
| 211 void set_plugin_available(bool plugin_available) { | 256 void set_plugin_available(bool plugin_available) { |
| 212 plugin_available_ = plugin_available; | 257 plugin_available_ = plugin_available; |
| 213 } | 258 } |
| 214 | 259 |
| 215 void set_plugin_stale(bool plugin_stale) { plugin_stale_ = plugin_stale; } | 260 void set_plugin_stale(bool plugin_stale) { plugin_stale_ = plugin_stale; } |
| 216 | 261 |
| 217 bool TestStreamIsIntercepted(bool allow_download, | 262 bool TestStreamIsIntercepted(bool allow_download, |
| 218 bool must_download, | 263 bool must_download, |
| 219 ResourceType request_resource_type); | 264 ResourceType request_resource_type); |
| 220 | 265 |
| 221 std::string TestAcceptHeaderSetting(ResourceType request_resource_type); | 266 // Tests the operation of the MimeSniffingHandler when it needs to buffer |
| 222 std::string TestAcceptHeaderSettingWithURLRequest( | 267 // data (example case: the response is text/plain). |
| 223 ResourceType request_resource_type, | 268 void TestHandlerSniffing(bool response_started, |
| 224 net::URLRequest* request); | 269 bool defer_response_started, |
| 270 bool will_read, | |
| 271 bool read_completed, | |
| 272 bool defer_read_completed); | |
| 273 | |
| 274 // Tests the operation of the MimeSniffingHandler when it doesn't buffer | |
| 275 // data (example case: the response is text/html). | |
| 276 void TestHandlerNoSniffing(bool response_started, | |
| 277 bool defer_response_started, | |
| 278 bool will_read, | |
| 279 bool read_completed, | |
| 280 bool defer_read_completed); | |
| 225 | 281 |
| 226 private: | 282 private: |
| 227 // Whether the URL request should be intercepted as a stream. | 283 // Whether the URL request should be intercepted as a stream. |
| 228 bool stream_has_handler_; | 284 bool stream_has_handler_; |
| 229 bool plugin_available_; | 285 bool plugin_available_; |
| 230 bool plugin_stale_; | 286 bool plugin_stale_; |
| 231 | 287 |
| 232 TestBrowserThreadBundle thread_bundle_; | 288 TestBrowserThreadBundle thread_bundle_; |
| 233 }; | 289 }; |
| 234 | 290 |
| 235 bool MimeTypeResourceHandlerTest::TestStreamIsIntercepted( | 291 std::string MimeSniffingResourceHandlerTest::TestAcceptHeaderSetting( |
| 292 ResourceType request_resource_type) { | |
| 293 net::URLRequestContext context; | |
| 294 std::unique_ptr<net::URLRequest> request(context.CreateRequest( | |
| 295 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); | |
| 296 return TestAcceptHeaderSettingWithURLRequest(request_resource_type, | |
| 297 request.get()); | |
| 298 } | |
| 299 | |
| 300 std::string | |
| 301 MimeSniffingResourceHandlerTest::TestAcceptHeaderSettingWithURLRequest( | |
| 302 ResourceType request_resource_type, | |
| 303 net::URLRequest* request) { | |
| 304 bool is_main_frame = request_resource_type == RESOURCE_TYPE_MAIN_FRAME; | |
| 305 ResourceRequestInfo::AllocateForTesting(request, request_resource_type, | |
| 306 nullptr, // context | |
| 307 0, // render_process_id | |
| 308 0, // render_view_id | |
| 309 0, // render_frame_id | |
| 310 is_main_frame, // is_main_frame | |
| 311 false, // parent_is_main_frame | |
| 312 false, // allow_download | |
| 313 true, // is_async | |
| 314 false); // is_using_lofi | |
| 315 | |
| 316 std::unique_ptr<ResourceHandler> mime_sniffing_handler( | |
| 317 new MimeSniffingResourceHandler( | |
| 318 std::unique_ptr<ResourceHandler>( | |
| 319 new TestResourceHandler(false, false, false, false, false)), | |
| 320 nullptr, nullptr, nullptr, request)); | |
| 321 | |
| 322 bool defer = false; | |
| 323 mime_sniffing_handler->OnWillStart(request->url(), &defer); | |
| 324 content::RunAllPendingInMessageLoop(); | |
| 325 | |
| 326 std::string accept_header; | |
| 327 request->extra_request_headers().GetHeader("Accept", &accept_header); | |
| 328 return accept_header; | |
| 329 } | |
| 330 | |
| 331 bool MimeSniffingResourceHandlerTest::TestStreamIsIntercepted( | |
| 236 bool allow_download, | 332 bool allow_download, |
| 237 bool must_download, | 333 bool must_download, |
| 238 ResourceType request_resource_type) { | 334 ResourceType request_resource_type) { |
| 239 net::URLRequestContext context; | 335 net::URLRequestContext context; |
| 240 std::unique_ptr<net::URLRequest> request(context.CreateRequest( | 336 std::unique_ptr<net::URLRequest> request(context.CreateRequest( |
| 241 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); | 337 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); |
| 242 bool is_main_frame = request_resource_type == RESOURCE_TYPE_MAIN_FRAME; | 338 bool is_main_frame = request_resource_type == RESOURCE_TYPE_MAIN_FRAME; |
| 243 ResourceRequestInfo::AllocateForTesting( | 339 ResourceRequestInfo::AllocateForTesting(request.get(), request_resource_type, |
| 244 request.get(), | 340 nullptr, // context |
| 245 request_resource_type, | 341 0, // render_process_id |
| 246 nullptr, // context | 342 0, // render_view_id |
| 247 0, // render_process_id | 343 0, // render_frame_id |
| 248 0, // render_view_id | 344 is_main_frame, // is_main_frame |
| 249 0, // render_frame_id | 345 false, // parent_is_main_frame |
| 250 is_main_frame, // is_main_frame | 346 allow_download, // allow_download |
| 251 false, // parent_is_main_frame | 347 true, // is_async |
| 252 allow_download, // allow_download | 348 false); // is_using_lofi |
| 253 true, // is_async | |
| 254 false); // is_using_lofi | |
| 255 | 349 |
| 256 TestResourceDispatcherHost host(stream_has_handler_); | 350 TestResourceDispatcherHost host(stream_has_handler_); |
| 257 TestResourceDispatcherHostDelegate host_delegate(must_download); | 351 TestResourceDispatcherHostDelegate host_delegate(must_download); |
| 258 host.SetDelegate(&host_delegate); | 352 host.SetDelegate(&host_delegate); |
| 259 | 353 |
| 260 TestFakePluginService plugin_service(plugin_available_, plugin_stale_); | 354 TestFakePluginService plugin_service(plugin_available_, plugin_stale_); |
| 261 std::unique_ptr<ResourceHandler> mime_sniffing_handler( | 355 std::unique_ptr<InterceptingResourceHandler> intercepting_handler( |
| 262 new MimeTypeResourceHandler( | 356 new InterceptingResourceHandler(std::unique_ptr<ResourceHandler>(), |
| 263 std::unique_ptr<ResourceHandler>(new TestResourceHandler()), &host, | 357 nullptr)); |
| 264 &plugin_service, request.get())); | 358 std::unique_ptr<ResourceHandler> mime_handler(new MimeSniffingResourceHandler( |
| 359 std::unique_ptr<ResourceHandler>( | |
| 360 new TestResourceHandler(false, false, false, false, false)), | |
| 361 &host, &plugin_service, intercepting_handler.get(), request.get())); | |
| 362 | |
| 265 TestResourceController resource_controller; | 363 TestResourceController resource_controller; |
| 266 mime_sniffing_handler->SetController(&resource_controller); | 364 mime_handler->SetController(&resource_controller); |
| 267 | 365 |
| 268 scoped_refptr<ResourceResponse> response(new ResourceResponse); | 366 scoped_refptr<ResourceResponse> response(new ResourceResponse); |
| 269 // The MIME type isn't important but it shouldn't be empty. | 367 // The MIME type isn't important but it shouldn't be empty. |
| 270 response->head.mime_type = "application/pdf"; | 368 response->head.mime_type = "application/pdf"; |
| 271 | 369 |
| 272 bool defer = false; | 370 bool defer = false; |
| 273 mime_sniffing_handler->OnResponseStarted(response.get(), &defer); | 371 mime_handler->OnResponseStarted(response.get(), &defer); |
| 274 | 372 |
| 275 content::RunAllPendingInMessageLoop(); | 373 content::RunAllPendingInMessageLoop(); |
| 276 EXPECT_LT(host.intercepted_as_stream_count(), 2); | 374 EXPECT_LT(host.intercepted_as_stream_count(), 2); |
| 375 if (allow_download) | |
| 376 EXPECT_TRUE(intercepting_handler->new_handler_for_testing()); | |
| 277 return host.intercepted_as_stream(); | 377 return host.intercepted_as_stream(); |
| 278 } | 378 } |
| 279 | 379 |
| 280 std::string MimeTypeResourceHandlerTest::TestAcceptHeaderSetting( | 380 void MimeSniffingResourceHandlerTest::TestHandlerSniffing( |
| 281 ResourceType request_resource_type) { | 381 bool response_started, |
| 382 bool defer_response_started, | |
| 383 bool will_read, | |
| 384 bool read_completed, | |
| 385 bool defer_read_completed) { | |
| 282 net::URLRequestContext context; | 386 net::URLRequestContext context; |
| 283 std::unique_ptr<net::URLRequest> request(context.CreateRequest( | 387 std::unique_ptr<net::URLRequest> request(context.CreateRequest( |
| 284 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); | 388 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); |
| 285 return TestAcceptHeaderSettingWithURLRequest( | 389 ResourceRequestInfo::AllocateForTesting(request.get(), |
| 286 request_resource_type, request.get()); | 390 RESOURCE_TYPE_MAIN_FRAME, |
| 287 } | 391 nullptr, // context |
| 288 | 392 0, // render_process_id |
| 289 std::string MimeTypeResourceHandlerTest::TestAcceptHeaderSettingWithURLRequest( | 393 0, // render_view_id |
| 290 ResourceType request_resource_type, | 394 0, // render_frame_id |
| 291 net::URLRequest* request) { | 395 true, // is_main_frame |
| 292 bool is_main_frame = request_resource_type == RESOURCE_TYPE_MAIN_FRAME; | 396 false, // parent_is_main_frame |
| 293 ResourceRequestInfo::AllocateForTesting( | 397 false, // allow_download |
| 294 request, | 398 true, // is_async |
| 295 request_resource_type, | 399 false); // is_using_lofi |
| 296 nullptr, // context | 400 |
| 297 0, // render_process_id | 401 TestResourceDispatcherHost host(false); |
| 298 0, // render_view_id | |
| 299 0, // render_frame_id | |
| 300 is_main_frame, // is_main_frame | |
| 301 false, // parent_is_main_frame | |
| 302 false, // allow_download | |
| 303 true, // is_async | |
| 304 false); // is_using_lofi | |
| 305 | |
| 306 TestResourceDispatcherHost host(stream_has_handler_); | |
| 307 TestResourceDispatcherHostDelegate host_delegate(false); | 402 TestResourceDispatcherHostDelegate host_delegate(false); |
| 308 host.SetDelegate(&host_delegate); | 403 host.SetDelegate(&host_delegate); |
| 309 | 404 |
| 310 std::unique_ptr<ResourceHandler> mime_sniffing_handler( | 405 TestFakePluginService plugin_service(plugin_available_, plugin_stale_); |
| 311 new MimeTypeResourceHandler( | 406 std::unique_ptr<InterceptingResourceHandler> intercepting_handler( |
| 312 std::unique_ptr<ResourceHandler>(new TestResourceHandler()), &host, | 407 new InterceptingResourceHandler(std::unique_ptr<ResourceHandler>(), |
| 313 nullptr, request)); | 408 nullptr)); |
| 314 | 409 std::unique_ptr<MimeSniffingResourceHandler> mime_sniffing_handler( |
| 410 new MimeSniffingResourceHandler( | |
| 411 std::unique_ptr<ResourceHandler>(new TestResourceHandler( | |
| 412 response_started, defer_response_started, will_read, | |
| 413 read_completed, defer_read_completed)), | |
|
mmenke
2016/07/27 19:34:00
In this test and the next, should we check that th
clamy
2016/08/17 12:47:35
Done.
| |
| 414 &host, &plugin_service, intercepting_handler.get(), request.get())); | |
| 415 | |
| 416 TestResourceController resource_controller; | |
| 417 mime_sniffing_handler->SetController(&resource_controller); | |
| 418 | |
| 419 // The response should be sniffed. | |
| 420 scoped_refptr<ResourceResponse> response(new ResourceResponse); | |
| 421 response->head.mime_type.assign("text/plain"); | |
| 422 | |
| 423 // Simulate the response starting. We should start buffering, so the return | |
|
mmenke
2016/07/27 19:34:00
nit: Avoid "we" in comments
clamy
2016/08/17 12:47:35
Done.
| |
| 424 // value should always be true. | |
| 315 bool defer = false; | 425 bool defer = false; |
| 316 mime_sniffing_handler->OnWillStart(request->url(), &defer); | 426 EXPECT_TRUE(mime_sniffing_handler->OnResponseStarted(response.get(), &defer)); |
| 427 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 428 EXPECT_EQ(0, resource_controller.resume_call_count()); | |
| 429 EXPECT_FALSE(defer); | |
| 430 | |
| 431 // Read some data to sniff the mime type. This will ask the next | |
| 432 // ResourceHandler for a buffer. | |
| 433 scoped_refptr<net::IOBuffer> read_buffer; | |
| 434 int buf_size = 0; | |
| 435 EXPECT_EQ(will_read, | |
| 436 mime_sniffing_handler->OnWillRead(&read_buffer, &buf_size, -1)); | |
|
mmenke
2016/07/27 19:34:01
Per comment in the other file, should probably sta
clamy
2016/08/17 12:47:35
Done.
| |
| 437 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 438 | |
| 439 if (!will_read) { | |
| 440 EXPECT_FALSE(defer); | |
|
mmenke
2016/07/27 19:34:00
Oops - WillRead doesn't take defer as an argument,
clamy
2016/08/17 12:47:35
Done.
| |
| 441 | |
| 442 // Process all messages to ensure proper test teardown. | |
| 443 content::RunAllPendingInMessageLoop(); | |
| 444 return; | |
| 445 } | |
| 446 | |
| 447 // Simulate an HTML page. The mime sniffer will identify the MimeType and | |
| 448 // proceed with replay. | |
| 449 char data[] = "!DOCTYPE html\n<head>\n<title>Foo</title>\n</head>"; | |
| 450 memcpy(read_buffer->data(), data, sizeof(data)); | |
| 451 | |
| 452 defer = false; | |
| 453 bool return_value = | |
| 454 mime_sniffing_handler->OnReadCompleted(sizeof(data), &defer); | |
| 455 | |
| 456 // If the next handler cancels the response start, we hsould be notified | |
|
mmenke
2016/07/27 19:34:00
nit: Avoid "we" in comments
mmenke
2016/07/27 19:34:01
nit: hsould -> should
clamy
2016/08/17 12:47:35
Done.
| |
| 457 // immediately. | |
| 458 if (!response_started) { | |
| 459 EXPECT_FALSE(defer); | |
| 460 EXPECT_EQ(response_started, return_value); | |
| 461 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 462 | |
| 463 // Process all messages to ensure proper test teardown. | |
| 464 content::RunAllPendingInMessageLoop(); | |
| 465 return; | |
| 466 } | |
| 467 | |
| 468 // The replay can be deferred both at response started and read replay | |
| 469 // stages. | |
| 470 EXPECT_EQ(defer, defer_response_started || defer_read_completed); | |
| 471 if (defer_response_started) { | |
| 472 EXPECT_TRUE(defer); | |
| 473 EXPECT_TRUE(return_value); | |
| 474 EXPECT_EQ(MimeSniffingResourceHandler::STATE_REPLAYING_RESPONSE_RECEIVED, | |
| 475 mime_sniffing_handler->state_); | |
| 476 mime_sniffing_handler->Resume(); | |
| 477 } | |
| 478 | |
| 479 // The body that was sniffed should be transmitted to the next handler. This | |
| 480 // may cancel the request. | |
| 481 if (!read_completed) { | |
| 482 if (defer_response_started) { | |
| 483 EXPECT_EQ(1, resource_controller.cancel_call_count()); | |
| 484 } else { | |
| 485 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 486 EXPECT_FALSE(return_value); | |
| 487 } | |
| 488 // Process all messages to ensure proper test teardown. | |
| 489 content::RunAllPendingInMessageLoop(); | |
| 490 return; | |
| 491 } | |
| 492 | |
| 493 EXPECT_EQ(MimeSniffingResourceHandler::STATE_STREAMING, | |
| 494 mime_sniffing_handler->state_); | |
| 495 | |
| 496 // The request may be deferred by the next handler once the read is done. | |
| 497 if (defer_read_completed) { | |
| 498 EXPECT_TRUE(defer); | |
| 499 mime_sniffing_handler->Resume(); | |
| 500 } | |
| 501 | |
| 502 EXPECT_EQ(MimeSniffingResourceHandler::STATE_STREAMING, | |
| 503 mime_sniffing_handler->state_); | |
| 504 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 505 | |
| 506 // Even if the next handler defers the request twice, the | |
| 507 // MimeSniffingResourceHandler should only call Resume on its controller | |
| 508 // once. | |
| 509 if (defer_response_started || defer_read_completed) | |
| 510 EXPECT_EQ(1, resource_controller.resume_call_count()); | |
| 511 else | |
| 512 EXPECT_EQ(0, resource_controller.resume_call_count()); | |
|
mmenke
2016/07/27 19:34:00
nit: Use braces
clamy
2016/08/17 12:47:35
Done.
| |
| 513 | |
| 514 // Process all messages to ensure proper test teardown. | |
| 317 content::RunAllPendingInMessageLoop(); | 515 content::RunAllPendingInMessageLoop(); |
| 318 | |
| 319 std::string accept_header; | |
| 320 request->extra_request_headers().GetHeader("Accept", &accept_header); | |
| 321 return accept_header; | |
| 322 } | 516 } |
| 323 | 517 |
| 518 void MimeSniffingResourceHandlerTest::TestHandlerNoSniffing( | |
| 519 bool response_started, | |
| 520 bool defer_response_started, | |
| 521 bool will_read, | |
| 522 bool read_completed, | |
| 523 bool defer_read_completed) { | |
| 524 net::URLRequestContext context; | |
| 525 std::unique_ptr<net::URLRequest> request(context.CreateRequest( | |
| 526 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); | |
| 527 ResourceRequestInfo::AllocateForTesting(request.get(), | |
| 528 RESOURCE_TYPE_MAIN_FRAME, | |
| 529 nullptr, // context | |
| 530 0, // render_process_id | |
| 531 0, // render_view_id | |
| 532 0, // render_frame_id | |
| 533 true, // is_main_frame | |
| 534 false, // parent_is_main_frame | |
| 535 false, // allow_download | |
| 536 true, // is_async | |
| 537 false); // is_using_lofi | |
| 538 | |
| 539 TestResourceDispatcherHost host(false); | |
| 540 TestResourceDispatcherHostDelegate host_delegate(false); | |
| 541 host.SetDelegate(&host_delegate); | |
| 542 | |
| 543 TestFakePluginService plugin_service(plugin_available_, plugin_stale_); | |
| 544 std::unique_ptr<InterceptingResourceHandler> intercepting_handler( | |
| 545 new InterceptingResourceHandler(std::unique_ptr<ResourceHandler>(), | |
| 546 nullptr)); | |
| 547 | |
| 548 std::unique_ptr<MimeSniffingResourceHandler> mime_sniffing_handler( | |
| 549 new MimeSniffingResourceHandler( | |
| 550 std::unique_ptr<ResourceHandler>(new TestResourceHandler( | |
| 551 response_started, defer_response_started, will_read, | |
| 552 read_completed, defer_read_completed)), | |
| 553 &host, &plugin_service, intercepting_handler.get(), request.get())); | |
| 554 | |
| 555 TestResourceController resource_controller; | |
| 556 mime_sniffing_handler->SetController(&resource_controller); | |
| 557 int expected_resume_calls = 0; | |
| 558 | |
| 559 // The response should not be sniffed. | |
| 560 scoped_refptr<ResourceResponse> response(new ResourceResponse); | |
| 561 response->head.mime_type.assign("text/html"); | |
| 562 | |
| 563 // Simulate the response starting. There should be no need for buffering, so | |
| 564 // the return value should be that of the next handler. | |
| 565 bool defer = false; | |
| 566 EXPECT_EQ(response_started, | |
| 567 mime_sniffing_handler->OnResponseStarted(response.get(), &defer)); | |
| 568 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 569 | |
| 570 if (!response_started) { | |
| 571 EXPECT_FALSE(defer); | |
| 572 | |
| 573 // Process all messages to ensure proper test teardown. | |
| 574 content::RunAllPendingInMessageLoop(); | |
| 575 return; | |
| 576 } | |
| 577 | |
| 578 EXPECT_EQ(defer_response_started, defer); | |
| 579 if (defer) { | |
| 580 EXPECT_EQ(MimeSniffingResourceHandler::STATE_REPLAYING_RESPONSE_RECEIVED, | |
| 581 mime_sniffing_handler->state_); | |
| 582 expected_resume_calls++; | |
| 583 mime_sniffing_handler->Resume(); | |
| 584 } | |
| 585 | |
| 586 EXPECT_EQ(expected_resume_calls, resource_controller.resume_call_count()); | |
| 587 | |
| 588 // The MimeSniffingResourceHandler should be acting as a pass-through | |
| 589 // ResourceHandler. | |
| 590 scoped_refptr<net::IOBuffer> read_buffer; | |
| 591 int buf_size = 0; | |
| 592 EXPECT_EQ(will_read, | |
| 593 mime_sniffing_handler->OnWillRead(&read_buffer, &buf_size, -1)); | |
| 594 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 595 | |
| 596 if (!will_read) { | |
| 597 // Process all messages to ensure proper test teardown. | |
| 598 content::RunAllPendingInMessageLoop(); | |
| 599 return; | |
| 600 } | |
| 601 | |
| 602 defer = false; | |
| 603 EXPECT_EQ(read_completed, | |
| 604 mime_sniffing_handler->OnReadCompleted(2000, &defer)); | |
| 605 EXPECT_EQ(0, resource_controller.cancel_call_count()); | |
| 606 | |
| 607 if (!read_completed) { | |
| 608 EXPECT_FALSE(defer); | |
| 609 | |
| 610 // Process all messages to ensure proper test teardown. | |
| 611 content::RunAllPendingInMessageLoop(); | |
| 612 return; | |
| 613 } | |
| 614 | |
| 615 EXPECT_EQ(defer_read_completed, defer); | |
| 616 if (defer) { | |
| 617 expected_resume_calls++; | |
| 618 mime_sniffing_handler->Resume(); | |
| 619 } | |
| 620 EXPECT_EQ(expected_resume_calls, resource_controller.resume_call_count()); | |
| 621 | |
| 622 // Process all messages to ensure proper test teardown. | |
| 623 content::RunAllPendingInMessageLoop(); | |
| 624 } | |
| 625 | |
| 324 // Test that the proper Accept: header is set based on the ResourceType | 626 // Test that the proper Accept: header is set based on the ResourceType |
| 325 TEST_F(MimeTypeResourceHandlerTest, AcceptHeaders) { | 627 TEST_F(MimeSniffingResourceHandlerTest, AcceptHeaders) { |
| 326 EXPECT_EQ( | 628 EXPECT_EQ( |
| 327 "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp," | 629 "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp," |
| 328 "*/*;q=0.8", | 630 "*/*;q=0.8", |
| 329 TestAcceptHeaderSetting(RESOURCE_TYPE_MAIN_FRAME)); | 631 TestAcceptHeaderSetting(RESOURCE_TYPE_MAIN_FRAME)); |
| 330 EXPECT_EQ( | 632 EXPECT_EQ( |
| 331 "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp," | 633 "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp," |
| 332 "*/*;q=0.8", | 634 "*/*;q=0.8", |
| 333 TestAcceptHeaderSetting(RESOURCE_TYPE_SUB_FRAME)); | 635 TestAcceptHeaderSetting(RESOURCE_TYPE_SUB_FRAME)); |
| 334 EXPECT_EQ("text/css,*/*;q=0.1", | 636 EXPECT_EQ("text/css,*/*;q=0.1", |
| 335 TestAcceptHeaderSetting(RESOURCE_TYPE_STYLESHEET)); | 637 TestAcceptHeaderSetting(RESOURCE_TYPE_STYLESHEET)); |
| 336 EXPECT_EQ("*/*", | 638 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_SCRIPT)); |
| 337 TestAcceptHeaderSetting(RESOURCE_TYPE_SCRIPT)); | |
| 338 EXPECT_EQ("image/webp,image/*,*/*;q=0.8", | 639 EXPECT_EQ("image/webp,image/*,*/*;q=0.8", |
| 339 TestAcceptHeaderSetting(RESOURCE_TYPE_IMAGE)); | 640 TestAcceptHeaderSetting(RESOURCE_TYPE_IMAGE)); |
| 340 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_FONT_RESOURCE)); | 641 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_FONT_RESOURCE)); |
| 341 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_SUB_RESOURCE)); | 642 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_SUB_RESOURCE)); |
| 342 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_OBJECT)); | 643 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_OBJECT)); |
| 343 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_MEDIA)); | 644 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_MEDIA)); |
| 344 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_WORKER)); | 645 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_WORKER)); |
| 345 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_SHARED_WORKER)); | 646 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_SHARED_WORKER)); |
| 346 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_PREFETCH)); | 647 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_PREFETCH)); |
| 347 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_FAVICON)); | 648 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_FAVICON)); |
| 348 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_XHR)); | 649 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_XHR)); |
| 349 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_PING)); | 650 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_PING)); |
| 350 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_SERVICE_WORKER)); | 651 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_SERVICE_WORKER)); |
| 351 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_CSP_REPORT)); | 652 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_CSP_REPORT)); |
| 352 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_PLUGIN_RESOURCE)); | 653 EXPECT_EQ("*/*", TestAcceptHeaderSetting(RESOURCE_TYPE_PLUGIN_RESOURCE)); |
| 353 | 654 |
| 354 // Ensure that if an Accept header is already set, it is not overwritten. | 655 // Ensure that if an Accept header is already set, it is not overwritten. |
| 355 net::URLRequestContext context; | 656 net::URLRequestContext context; |
| 356 std::unique_ptr<net::URLRequest> request(context.CreateRequest( | 657 std::unique_ptr<net::URLRequest> request(context.CreateRequest( |
| 357 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); | 658 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); |
| 358 request->SetExtraRequestHeaderByName("Accept", "*", true); | 659 request->SetExtraRequestHeaderByName("Accept", "*", true); |
| 359 EXPECT_EQ("*", | 660 EXPECT_EQ("*", TestAcceptHeaderSettingWithURLRequest(RESOURCE_TYPE_XHR, |
| 360 TestAcceptHeaderSettingWithURLRequest(RESOURCE_TYPE_XHR, request.get())); | 661 request.get())); |
| 361 } | 662 } |
| 362 | 663 |
| 363 // Test that stream requests are correctly intercepted under the right | 664 // Test that stream requests are correctly intercepted under the right |
| 364 // circumstances. Test is not relevent when plugins are disabled. | 665 // circumstances. Test is not relevent when plugins are disabled. |
| 365 #if defined(ENABLE_PLUGINS) | 666 #if defined(ENABLE_PLUGINS) |
| 366 TEST_F(MimeTypeResourceHandlerTest, StreamHandling) { | 667 TEST_F(MimeSniffingResourceHandlerTest, StreamHandling) { |
| 367 bool allow_download; | 668 bool allow_download; |
| 368 bool must_download; | 669 bool must_download; |
| 369 ResourceType resource_type; | 670 ResourceType resource_type; |
| 370 | 671 |
| 371 // Ensure the stream is handled by MaybeInterceptAsStream in the | 672 // Ensure the stream is handled by MaybeInterceptAsStream in the |
| 372 // ResourceDispatcherHost. | 673 // ResourceDispatcherHost. |
| 373 set_stream_has_handler(true); | 674 set_stream_has_handler(true); |
| 374 set_plugin_available(true); | 675 set_plugin_available(true); |
| 375 | 676 |
| 376 // Main frame request with no download allowed. Stream shouldn't be | 677 // Main frame request with no download allowed. Stream shouldn't be |
| (...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 420 | 721 |
| 421 // Test the cases where the stream isn't handled by MaybeInterceptAsStream | 722 // Test the cases where the stream isn't handled by MaybeInterceptAsStream |
| 422 // in the ResourceDispatcherHost. | 723 // in the ResourceDispatcherHost. |
| 423 set_stream_has_handler(false); | 724 set_stream_has_handler(false); |
| 424 allow_download = false; | 725 allow_download = false; |
| 425 must_download = false; | 726 must_download = false; |
| 426 resource_type = RESOURCE_TYPE_OBJECT; | 727 resource_type = RESOURCE_TYPE_OBJECT; |
| 427 EXPECT_FALSE( | 728 EXPECT_FALSE( |
| 428 TestStreamIsIntercepted(allow_download, must_download, resource_type)); | 729 TestStreamIsIntercepted(allow_download, must_download, resource_type)); |
| 429 | 730 |
| 430 allow_download = true; | |
| 431 must_download = false; | |
| 432 resource_type = RESOURCE_TYPE_MAIN_FRAME; | |
| 433 EXPECT_FALSE( | |
| 434 TestStreamIsIntercepted(allow_download, must_download, resource_type)); | |
| 435 | |
| 436 // Test the cases where the stream handled by MaybeInterceptAsStream | 731 // Test the cases where the stream handled by MaybeInterceptAsStream |
| 437 // with plugin not available. This is the case when intercepting streams for | 732 // with plugin not available. This is the case when intercepting streams for |
| 438 // the streamsPrivate extensions API. | 733 // the streamsPrivate extensions API. |
| 439 set_stream_has_handler(true); | 734 set_stream_has_handler(true); |
| 440 set_plugin_available(false); | 735 set_plugin_available(false); |
| 441 allow_download = false; | 736 allow_download = false; |
| 442 must_download = false; | 737 must_download = false; |
| 443 resource_type = RESOURCE_TYPE_OBJECT; | 738 resource_type = RESOURCE_TYPE_OBJECT; |
| 444 EXPECT_TRUE( | 739 EXPECT_TRUE( |
| 445 TestStreamIsIntercepted(allow_download, must_download, resource_type)); | 740 TestStreamIsIntercepted(allow_download, must_download, resource_type)); |
| 446 | 741 |
| 447 // Test the cases where the stream handled by MaybeInterceptAsStream | 742 // Test the cases where the stream handled by MaybeInterceptAsStream |
| 448 // with plugin not available. This is the case when intercepting streams for | 743 // with plugin not available. This is the case when intercepting streams for |
| 449 // the streamsPrivate extensions API with stale plugin. | 744 // the streamsPrivate extensions API with stale plugin. |
| 450 set_plugin_stale(true); | 745 set_plugin_stale(true); |
| 451 allow_download = false; | 746 allow_download = false; |
| 452 must_download = false; | 747 must_download = false; |
| 453 resource_type = RESOURCE_TYPE_OBJECT; | 748 resource_type = RESOURCE_TYPE_OBJECT; |
| 454 EXPECT_TRUE( | 749 EXPECT_TRUE( |
| 455 TestStreamIsIntercepted(allow_download, must_download, resource_type)); | 750 TestStreamIsIntercepted(allow_download, must_download, resource_type)); |
| 456 } | 751 } |
| 457 #endif | 752 #endif |
| 458 | 753 |
| 459 } // namespace | 754 // Test that the MimeSniffingHandler operates properly when it doesn't sniff |
| 755 // resources. | |
| 756 TEST_F(MimeSniffingResourceHandlerTest, NoSniffing) { | |
| 757 // Test simple case. | |
| 758 TestHandlerNoSniffing( | |
| 759 true /* response_started_succeeds */, | |
| 760 false /* defer_response_started */, | |
| 761 true /* will_read_succeeds */, | |
| 762 true /* read_completed_succeeds */, | |
| 763 false /* defer_read_completed */); | |
| 764 | |
| 765 // Test deferral in OnResponseStarted and/or in OnReadCompleted. | |
| 766 TestHandlerNoSniffing( | |
| 767 true /* response_started_succeeds */, | |
| 768 true /* defer_response_started */, | |
| 769 true /* will_read_succeeds */, | |
| 770 true /* read_completed_succeeds */, | |
| 771 false /* defer_read_completed */); | |
| 772 TestHandlerNoSniffing( | |
| 773 true /* response_started_succeeds */, | |
| 774 false /* defer_response_started */, | |
| 775 true /* will_read_succeeds */, | |
| 776 true /* read_completed_succeeds */, | |
| 777 true /* defer_read_completed */); | |
| 778 TestHandlerNoSniffing( | |
| 779 true /* response_started_succeeds */, | |
| 780 true /* defer_response_started */, | |
| 781 true /* will_read_succeeds */, | |
| 782 true /* read_completed_succeeds */, | |
| 783 true /* defer_read_completed */); | |
| 784 | |
| 785 // Test cancel in OnResponseStarted, OnWillRead, OnReadCompleted. | |
| 786 TestHandlerNoSniffing( | |
| 787 false /* response_started_succeeds */, | |
| 788 false /* defer_response_started */, | |
| 789 false /* will_read_succeeds */, | |
| 790 false /* read_completed_succeeds */, | |
| 791 false /* defer_read_completed */); | |
| 792 TestHandlerNoSniffing( | |
| 793 true /* response_started_succeeds */, | |
| 794 false /* defer_response_started */, | |
| 795 false /* will_read_succeeds */, | |
| 796 false /* read_completed_succeeds */, | |
| 797 false /* defer_read_completed */); | |
| 798 TestHandlerNoSniffing( | |
| 799 true /* response_started_succeeds */, | |
| 800 false /* defer_response_started */, | |
| 801 true /* will_read_succeeds */, | |
| 802 false /* read_completed_succeeds */, | |
| 803 false /* defer_read_completed */); | |
| 804 | |
| 805 // Test cancel after OnResponseStarted deferral. | |
| 806 TestHandlerNoSniffing( | |
| 807 true /* response_started_succeeds */, | |
| 808 true /* defer_response_started */, | |
| 809 false /* will_read_succeeds */, | |
| 810 false /* read_completed_succeeds */, | |
| 811 false /* defer_read_completed */); | |
| 812 TestHandlerNoSniffing( | |
| 813 true /* response_started_succeeds */, | |
| 814 true /* defer_response_started */, | |
| 815 true /* will_read_succeeds */, | |
| 816 false /* read_completed_succeeds */, | |
| 817 false /* defer_read_completed */); | |
| 818 | |
| 819 content::RunAllPendingInMessageLoop(); | |
| 820 } | |
| 821 | |
| 822 // Test that the MimeSniffingHandler operates properly when it sniffs | |
| 823 // resources. | |
| 824 TEST_F(MimeSniffingResourceHandlerTest, Sniffing) { | |
| 825 // Test simple case. | |
| 826 TestHandlerSniffing( | |
| 827 true /* response_started_succeeds */, | |
| 828 false /* defer_response_started */, | |
| 829 true /* will_read_succeeds */, | |
| 830 true /* read_completed_succeeds */, | |
| 831 false /* defer_read_completed */); | |
| 832 | |
| 833 // Test deferral in OnResponseStarted and/or in OnReadCompleted. | |
| 834 TestHandlerSniffing( | |
| 835 true /* response_started_succeeds */, | |
| 836 true /* defer_response_started */, | |
| 837 true /* will_read_succeeds */, | |
| 838 true /* read_completed_succeeds */, | |
| 839 false /* defer_read_completed */); | |
| 840 TestHandlerSniffing( | |
| 841 true /* response_started_succeeds */, | |
| 842 false /* defer_response_started */, | |
| 843 true /* will_read_succeeds */, | |
| 844 true /* read_completed_succeeds */, | |
| 845 true /* defer_read_completed */); | |
| 846 TestHandlerSniffing( | |
| 847 true /* response_started_succeeds */, | |
| 848 true /* defer_response_started */, | |
| 849 true /* will_read_succeeds */, | |
| 850 true /* read_completed_succeeds */, | |
| 851 true /* defer_read_completed */); | |
| 852 | |
| 853 // Test cancel in OnResponseStarted, OnWillRead, OnReadCompleted. | |
| 854 TestHandlerSniffing( | |
| 855 false /* response_started_succeeds */, | |
| 856 false /* defer_response_started */, | |
| 857 false /* will_read_succeeds */, | |
| 858 false /* read_completed_succeeds */, | |
| 859 false /* defer_read_completed */); | |
| 860 TestHandlerSniffing( | |
| 861 true /* response_started_succeeds */, | |
| 862 false /* defer_response_started */, | |
| 863 false /* will_read_succeeds */, | |
| 864 false /* read_completed_succeeds */, | |
| 865 false /* defer_read_completed */); | |
| 866 TestHandlerSniffing( | |
| 867 true /* response_started_succeeds */, | |
| 868 false /* defer_response_started */, | |
| 869 true /* will_read_succeeds */, | |
| 870 false /* read_completed_succeeds */, | |
| 871 false /* defer_read_completed */); | |
| 872 | |
| 873 // Test cancel after OnResponseStarted deferral. | |
| 874 TestHandlerSniffing( | |
| 875 true /* response_started_succeeds */, | |
| 876 true /* defer_response_started */, | |
| 877 false /* will_read_succeeds */, | |
| 878 false /* read_completed_succeeds */, | |
| 879 false /* defer_read_completed */); | |
| 880 TestHandlerSniffing( | |
| 881 true /* response_started_succeeds */, | |
| 882 true /* defer_response_started */, | |
| 883 true /* will_read_succeeds */, | |
| 884 false /* read_completed_succeeds */, | |
| 885 false /* defer_read_completed */); | |
| 886 | |
| 887 content::RunAllPendingInMessageLoop(); | |
| 888 } | |
| 889 | |
| 890 // Tests that 304s do not trigger a change in handlers. | |
| 891 TEST_F(MimeSniffingResourceHandlerTest, 304Handling) { | |
| 892 net::URLRequestContext context; | |
| 893 std::unique_ptr<net::URLRequest> request(context.CreateRequest( | |
| 894 GURL("http://www.google.com"), net::DEFAULT_PRIORITY, nullptr)); | |
| 895 ResourceRequestInfo::AllocateForTesting(request.get(), | |
| 896 RESOURCE_TYPE_MAIN_FRAME, | |
| 897 nullptr, // context | |
| 898 0, // render_process_id | |
| 899 0, // render_view_id | |
| 900 0, // render_frame_id | |
| 901 true, // is_main_frame | |
| 902 false, // parent_is_main_frame | |
| 903 true, // allow_download | |
| 904 true, // is_async | |
| 905 false); // is_using_lofi | |
| 906 | |
| 907 TestResourceDispatcherHost host(false); | |
| 908 TestResourceDispatcherHostDelegate host_delegate(false); | |
| 909 host.SetDelegate(&host_delegate); | |
| 910 | |
| 911 TestFakePluginService plugin_service(false, false); | |
| 912 std::unique_ptr<ResourceHandler> intercepting_handler( | |
| 913 new InterceptingResourceHandler(std::unique_ptr<ResourceHandler>(), | |
| 914 nullptr)); | |
| 915 std::unique_ptr<ResourceHandler> mime_handler(new MimeSniffingResourceHandler( | |
| 916 std::unique_ptr<ResourceHandler>( | |
| 917 new TestResourceHandler(true, false, true, true, false)), | |
| 918 &host, &plugin_service, | |
| 919 static_cast<InterceptingResourceHandler*>(intercepting_handler.get()), | |
| 920 request.get())); | |
| 921 | |
| 922 TestResourceController resource_controller; | |
| 923 mime_handler->SetController(&resource_controller); | |
| 924 | |
| 925 // Simulate a 304 response. | |
| 926 scoped_refptr<ResourceResponse> response(new ResourceResponse); | |
| 927 // The MIME type isn't important but it shouldn't be empty. | |
| 928 response->head.mime_type = "application/pdf"; | |
| 929 response->head.headers = new net::HttpResponseHeaders("HTTP/1.x 304 OK"); | |
| 930 | |
| 931 // The response is received. No new ResourceHandler should be created to | |
| 932 // handle the download. | |
| 933 bool defer = false; | |
| 934 mime_handler->OnResponseStarted(response.get(), &defer); | |
| 935 EXPECT_FALSE(defer); | |
| 936 TestResourceHandler* new_handler = host.new_resource_handler(); | |
| 937 EXPECT_TRUE(!new_handler); | |
|
mmenke
2016/07/27 19:34:00
EXPECT_FALSE(new_handler)? Could also get rid of
clamy
2016/08/17 12:47:35
Done.
| |
| 938 | |
| 939 content::RunAllPendingInMessageLoop(); | |
| 940 } | |
| 460 | 941 |
| 461 } // namespace content | 942 } // namespace content |
| OLD | NEW |