| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/http/http_auth_handler_factory.h" | 5 #include "net/http/http_auth_handler_factory.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 | 8 |
| 9 #include "net/base/net_errors.h" | 9 #include "net/base/net_errors.h" |
| 10 #include "net/dns/mock_host_resolver.h" | 10 #include "net/dns/mock_host_resolver.h" |
| 11 #include "net/http/http_auth_handler.h" | 11 #include "net/http/http_auth_handler.h" |
| 12 #include "net/http/http_auth_scheme.h" | 12 #include "net/http/http_auth_scheme.h" |
| 13 #include "net/http/mock_allow_http_auth_preferences.h" | 13 #include "net/http/mock_allow_http_auth_preferences.h" |
| 14 #include "net/http/url_security_manager.h" | 14 #include "net/http/url_security_manager.h" |
| 15 #include "net/ssl/ssl_info.h" | 15 #include "net/ssl/ssl_info.h" |
| 16 #include "net/test/gtest_util.h" |
| 17 #include "testing/gmock/include/gmock/gmock.h" |
| 16 #include "testing/gtest/include/gtest/gtest.h" | 18 #include "testing/gtest/include/gtest/gtest.h" |
| 17 | 19 |
| 20 using net::test::IsError; |
| 21 using net::test::IsOk; |
| 22 |
| 18 namespace net { | 23 namespace net { |
| 19 | 24 |
| 20 namespace { | 25 namespace { |
| 21 | 26 |
| 22 class MockHttpAuthHandlerFactory : public HttpAuthHandlerFactory { | 27 class MockHttpAuthHandlerFactory : public HttpAuthHandlerFactory { |
| 23 public: | 28 public: |
| 24 explicit MockHttpAuthHandlerFactory(int return_code) : | 29 explicit MockHttpAuthHandlerFactory(int return_code) : |
| 25 return_code_(return_code) {} | 30 return_code_(return_code) {} |
| 26 ~MockHttpAuthHandlerFactory() override {} | 31 ~MockHttpAuthHandlerFactory() override {} |
| 27 | 32 |
| (...skipping 83 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 111 http_auth_handler_factory->SetHttpAuthPreferences(kNegotiateAuthScheme, | 116 http_auth_handler_factory->SetHttpAuthPreferences(kNegotiateAuthScheme, |
| 112 &http_auth_preferences); | 117 &http_auth_preferences); |
| 113 GURL server_origin("http://www.example.com"); | 118 GURL server_origin("http://www.example.com"); |
| 114 GURL proxy_origin("http://cache.example.com:3128"); | 119 GURL proxy_origin("http://cache.example.com:3128"); |
| 115 SSLInfo null_ssl_info; | 120 SSLInfo null_ssl_info; |
| 116 { | 121 { |
| 117 std::unique_ptr<HttpAuthHandler> handler; | 122 std::unique_ptr<HttpAuthHandler> handler; |
| 118 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( | 123 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
| 119 "Basic realm=\"FooBar\"", HttpAuth::AUTH_SERVER, null_ssl_info, | 124 "Basic realm=\"FooBar\"", HttpAuth::AUTH_SERVER, null_ssl_info, |
| 120 server_origin, BoundNetLog(), &handler); | 125 server_origin, BoundNetLog(), &handler); |
| 121 EXPECT_EQ(OK, rv); | 126 EXPECT_THAT(rv, IsOk()); |
| 122 ASSERT_FALSE(handler.get() == NULL); | 127 ASSERT_FALSE(handler.get() == NULL); |
| 123 EXPECT_EQ(HttpAuth::AUTH_SCHEME_BASIC, handler->auth_scheme()); | 128 EXPECT_EQ(HttpAuth::AUTH_SCHEME_BASIC, handler->auth_scheme()); |
| 124 EXPECT_STREQ("FooBar", handler->realm().c_str()); | 129 EXPECT_STREQ("FooBar", handler->realm().c_str()); |
| 125 EXPECT_EQ(HttpAuth::AUTH_SERVER, handler->target()); | 130 EXPECT_EQ(HttpAuth::AUTH_SERVER, handler->target()); |
| 126 EXPECT_FALSE(handler->encrypts_identity()); | 131 EXPECT_FALSE(handler->encrypts_identity()); |
| 127 EXPECT_FALSE(handler->is_connection_based()); | 132 EXPECT_FALSE(handler->is_connection_based()); |
| 128 } | 133 } |
| 129 { | 134 { |
| 130 std::unique_ptr<HttpAuthHandler> handler; | 135 std::unique_ptr<HttpAuthHandler> handler; |
| 131 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( | 136 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
| 132 "UNSUPPORTED realm=\"FooBar\"", HttpAuth::AUTH_SERVER, null_ssl_info, | 137 "UNSUPPORTED realm=\"FooBar\"", HttpAuth::AUTH_SERVER, null_ssl_info, |
| 133 server_origin, BoundNetLog(), &handler); | 138 server_origin, BoundNetLog(), &handler); |
| 134 EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, rv); | 139 EXPECT_THAT(rv, IsError(ERR_UNSUPPORTED_AUTH_SCHEME)); |
| 135 EXPECT_TRUE(handler.get() == NULL); | 140 EXPECT_TRUE(handler.get() == NULL); |
| 136 } | 141 } |
| 137 { | 142 { |
| 138 std::unique_ptr<HttpAuthHandler> handler; | 143 std::unique_ptr<HttpAuthHandler> handler; |
| 139 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( | 144 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
| 140 "Digest realm=\"FooBar\", nonce=\"xyz\"", HttpAuth::AUTH_PROXY, | 145 "Digest realm=\"FooBar\", nonce=\"xyz\"", HttpAuth::AUTH_PROXY, |
| 141 null_ssl_info, proxy_origin, BoundNetLog(), &handler); | 146 null_ssl_info, proxy_origin, BoundNetLog(), &handler); |
| 142 EXPECT_EQ(OK, rv); | 147 EXPECT_THAT(rv, IsOk()); |
| 143 ASSERT_FALSE(handler.get() == NULL); | 148 ASSERT_FALSE(handler.get() == NULL); |
| 144 EXPECT_EQ(HttpAuth::AUTH_SCHEME_DIGEST, handler->auth_scheme()); | 149 EXPECT_EQ(HttpAuth::AUTH_SCHEME_DIGEST, handler->auth_scheme()); |
| 145 EXPECT_STREQ("FooBar", handler->realm().c_str()); | 150 EXPECT_STREQ("FooBar", handler->realm().c_str()); |
| 146 EXPECT_EQ(HttpAuth::AUTH_PROXY, handler->target()); | 151 EXPECT_EQ(HttpAuth::AUTH_PROXY, handler->target()); |
| 147 EXPECT_TRUE(handler->encrypts_identity()); | 152 EXPECT_TRUE(handler->encrypts_identity()); |
| 148 EXPECT_FALSE(handler->is_connection_based()); | 153 EXPECT_FALSE(handler->is_connection_based()); |
| 149 } | 154 } |
| 150 { | 155 { |
| 151 std::unique_ptr<HttpAuthHandler> handler; | 156 std::unique_ptr<HttpAuthHandler> handler; |
| 152 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( | 157 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
| 153 "NTLM", HttpAuth::AUTH_SERVER, null_ssl_info, server_origin, | 158 "NTLM", HttpAuth::AUTH_SERVER, null_ssl_info, server_origin, |
| 154 BoundNetLog(), &handler); | 159 BoundNetLog(), &handler); |
| 155 EXPECT_EQ(OK, rv); | 160 EXPECT_THAT(rv, IsOk()); |
| 156 ASSERT_FALSE(handler.get() == NULL); | 161 ASSERT_FALSE(handler.get() == NULL); |
| 157 EXPECT_EQ(HttpAuth::AUTH_SCHEME_NTLM, handler->auth_scheme()); | 162 EXPECT_EQ(HttpAuth::AUTH_SCHEME_NTLM, handler->auth_scheme()); |
| 158 EXPECT_STREQ("", handler->realm().c_str()); | 163 EXPECT_STREQ("", handler->realm().c_str()); |
| 159 EXPECT_EQ(HttpAuth::AUTH_SERVER, handler->target()); | 164 EXPECT_EQ(HttpAuth::AUTH_SERVER, handler->target()); |
| 160 EXPECT_TRUE(handler->encrypts_identity()); | 165 EXPECT_TRUE(handler->encrypts_identity()); |
| 161 EXPECT_TRUE(handler->is_connection_based()); | 166 EXPECT_TRUE(handler->is_connection_based()); |
| 162 } | 167 } |
| 163 { | 168 { |
| 164 std::unique_ptr<HttpAuthHandler> handler; | 169 std::unique_ptr<HttpAuthHandler> handler; |
| 165 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( | 170 int rv = http_auth_handler_factory->CreateAuthHandlerFromString( |
| 166 "Negotiate", HttpAuth::AUTH_SERVER, null_ssl_info, server_origin, | 171 "Negotiate", HttpAuth::AUTH_SERVER, null_ssl_info, server_origin, |
| 167 BoundNetLog(), &handler); | 172 BoundNetLog(), &handler); |
| 168 // Note the default factory doesn't support Kerberos on Android | 173 // Note the default factory doesn't support Kerberos on Android |
| 169 #if defined(USE_KERBEROS) && !defined(OS_ANDROID) | 174 #if defined(USE_KERBEROS) && !defined(OS_ANDROID) |
| 170 EXPECT_EQ(OK, rv); | 175 EXPECT_THAT(rv, IsOk()); |
| 171 ASSERT_FALSE(handler.get() == NULL); | 176 ASSERT_FALSE(handler.get() == NULL); |
| 172 EXPECT_EQ(HttpAuth::AUTH_SCHEME_NEGOTIATE, handler->auth_scheme()); | 177 EXPECT_EQ(HttpAuth::AUTH_SCHEME_NEGOTIATE, handler->auth_scheme()); |
| 173 EXPECT_STREQ("", handler->realm().c_str()); | 178 EXPECT_STREQ("", handler->realm().c_str()); |
| 174 EXPECT_EQ(HttpAuth::AUTH_SERVER, handler->target()); | 179 EXPECT_EQ(HttpAuth::AUTH_SERVER, handler->target()); |
| 175 EXPECT_TRUE(handler->encrypts_identity()); | 180 EXPECT_TRUE(handler->encrypts_identity()); |
| 176 EXPECT_TRUE(handler->is_connection_based()); | 181 EXPECT_TRUE(handler->is_connection_based()); |
| 177 #else | 182 #else |
| 178 EXPECT_EQ(ERR_UNSUPPORTED_AUTH_SCHEME, rv); | 183 EXPECT_THAT(rv, IsError(ERR_UNSUPPORTED_AUTH_SCHEME)); |
| 179 EXPECT_TRUE(handler.get() == NULL); | 184 EXPECT_TRUE(handler.get() == NULL); |
| 180 #endif // defined(USE_KERBEROS) && !defined(OS_ANDROID) | 185 #endif // defined(USE_KERBEROS) && !defined(OS_ANDROID) |
| 181 } | 186 } |
| 182 } | 187 } |
| 183 | 188 |
| 184 } // namespace net | 189 } // namespace net |
| OLD | NEW |