| Index: net/http/http_network_transaction_unittest.cc
|
| diff --git a/net/http/http_network_transaction_unittest.cc b/net/http/http_network_transaction_unittest.cc
|
| index 4db194d3a51de74451c76934a0f9b10786768a41..7cafa6a8285c4624358134ab94574a737981c13e 100644
|
| --- a/net/http/http_network_transaction_unittest.cc
|
| +++ b/net/http/http_network_transaction_unittest.cc
|
| @@ -666,7 +666,7 @@ bool CheckBasicServerAuth(const AuthChallengeInfo* auth_challenge) {
|
| if (!auth_challenge)
|
| return false;
|
| EXPECT_FALSE(auth_challenge->is_proxy);
|
| - EXPECT_EQ("www.example.org:80", auth_challenge->challenger.ToString());
|
| + EXPECT_EQ("http://www.example.org", auth_challenge->challenger.Serialize());
|
| EXPECT_EQ("MyRealm1", auth_challenge->realm);
|
| EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme);
|
| return true;
|
| @@ -676,7 +676,17 @@ bool CheckBasicProxyAuth(const AuthChallengeInfo* auth_challenge) {
|
| if (!auth_challenge)
|
| return false;
|
| EXPECT_TRUE(auth_challenge->is_proxy);
|
| - EXPECT_EQ("myproxy:70", auth_challenge->challenger.ToString());
|
| + EXPECT_EQ("http://myproxy:70", auth_challenge->challenger.Serialize());
|
| + EXPECT_EQ("MyRealm1", auth_challenge->realm);
|
| + EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme);
|
| + return true;
|
| +}
|
| +
|
| +bool CheckBasicSecureProxyAuth(const AuthChallengeInfo* auth_challenge) {
|
| + if (!auth_challenge)
|
| + return false;
|
| + EXPECT_TRUE(auth_challenge->is_proxy);
|
| + EXPECT_EQ("https://myproxy:70", auth_challenge->challenger.Serialize());
|
| EXPECT_EQ("MyRealm1", auth_challenge->realm);
|
| EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme);
|
| return true;
|
| @@ -686,7 +696,7 @@ bool CheckDigestServerAuth(const AuthChallengeInfo* auth_challenge) {
|
| if (!auth_challenge)
|
| return false;
|
| EXPECT_FALSE(auth_challenge->is_proxy);
|
| - EXPECT_EQ("www.example.org:80", auth_challenge->challenger.ToString());
|
| + EXPECT_EQ("http://www.example.org", auth_challenge->challenger.Serialize());
|
| EXPECT_EQ("digestive", auth_challenge->realm);
|
| EXPECT_EQ(kDigestAuthScheme, auth_challenge->scheme);
|
| return true;
|
| @@ -697,7 +707,7 @@ bool CheckNTLMServerAuth(const AuthChallengeInfo* auth_challenge) {
|
| if (!auth_challenge)
|
| return false;
|
| EXPECT_FALSE(auth_challenge->is_proxy);
|
| - EXPECT_EQ("172.22.68.17:80", auth_challenge->challenger.ToString());
|
| + EXPECT_EQ("http://172.22.68.17", auth_challenge->challenger.Serialize());
|
| EXPECT_EQ(std::string(), auth_challenge->realm);
|
| EXPECT_EQ(kNtlmAuthScheme, auth_challenge->scheme);
|
| return true;
|
| @@ -4685,7 +4695,7 @@ TEST_P(HttpNetworkTransactionTest, HttpsProxySpdyGetWithProxyAuth) {
|
| ASSERT_TRUE(response->headers);
|
| EXPECT_EQ(407, response->headers->response_code());
|
| EXPECT_TRUE(response->was_fetched_via_spdy);
|
| - EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge.get()));
|
| + EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge.get()));
|
|
|
| TestCompletionCallback callback2;
|
|
|
| @@ -5379,7 +5389,7 @@ TEST_P(HttpNetworkTransactionTest, HttpsProxyAuthRetry) {
|
| ASSERT_TRUE(response->headers);
|
| EXPECT_EQ(407, response->headers->response_code());
|
| EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
|
| - EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge.get()));
|
| + EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge.get()));
|
|
|
| TestCompletionCallback callback2;
|
|
|
| @@ -6960,8 +6970,8 @@ TEST_P(HttpNetworkTransactionTest, BasicAuthCacheAndPreauth) {
|
| ASSERT_TRUE(response);
|
| ASSERT_TRUE(response->auth_challenge);
|
| EXPECT_FALSE(response->auth_challenge->is_proxy);
|
| - EXPECT_EQ("www.example.org:80",
|
| - response->auth_challenge->challenger.ToString());
|
| + EXPECT_EQ("http://www.example.org",
|
| + response->auth_challenge->challenger.Serialize());
|
| EXPECT_EQ("MyRealm2", response->auth_challenge->realm);
|
| EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme);
|
|
|
| @@ -7934,7 +7944,7 @@ TEST_P(HttpNetworkTransactionTest, BasicAuthSpdyProxy) {
|
| EXPECT_EQ(407, response->headers->response_code());
|
| EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion());
|
| EXPECT_TRUE(response->auth_challenge);
|
| - EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge.get()));
|
| + EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge.get()));
|
|
|
| TestCompletionCallback callback2;
|
|
|
| @@ -9876,7 +9886,7 @@ TEST_P(HttpNetworkTransactionTest, ChangeAuthRealms) {
|
| const AuthChallengeInfo* challenge = response->auth_challenge.get();
|
| ASSERT_TRUE(challenge);
|
| EXPECT_FALSE(challenge->is_proxy);
|
| - EXPECT_EQ("www.example.org:80", challenge->challenger.ToString());
|
| + EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize());
|
| EXPECT_EQ("first_realm", challenge->realm);
|
| EXPECT_EQ(kBasicAuthScheme, challenge->scheme);
|
|
|
| @@ -9894,7 +9904,7 @@ TEST_P(HttpNetworkTransactionTest, ChangeAuthRealms) {
|
| challenge = response->auth_challenge.get();
|
| ASSERT_TRUE(challenge);
|
| EXPECT_FALSE(challenge->is_proxy);
|
| - EXPECT_EQ("www.example.org:80", challenge->challenger.ToString());
|
| + EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize());
|
| EXPECT_EQ("second_realm", challenge->realm);
|
| EXPECT_EQ(kBasicAuthScheme, challenge->scheme);
|
|
|
| @@ -9913,7 +9923,7 @@ TEST_P(HttpNetworkTransactionTest, ChangeAuthRealms) {
|
| challenge = response->auth_challenge.get();
|
| ASSERT_TRUE(challenge);
|
| EXPECT_FALSE(challenge->is_proxy);
|
| - EXPECT_EQ("www.example.org:80", challenge->challenger.ToString());
|
| + EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize());
|
| EXPECT_EQ("first_realm", challenge->realm);
|
| EXPECT_EQ(kBasicAuthScheme, challenge->scheme);
|
|
|
|
|