| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // End-to-end tests for WebSocket. | 5 // End-to-end tests for WebSocket. |
| 6 // | 6 // |
| 7 // A python server is (re)started for each test, which is moderately | 7 // A python server is (re)started for each test, which is moderately |
| 8 // inefficient. However, it makes these tests a good fit for scenarios which | 8 // inefficient. However, it makes these tests a good fit for scenarios which |
| 9 // require special server configurations. | 9 // require special server configurations. |
| 10 | 10 |
| (...skipping 214 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 225 void OnFallback(const ProxyServer& bad_proxy, int net_error) override {} | 225 void OnFallback(const ProxyServer& bad_proxy, int net_error) override {} |
| 226 void OnBeforeTunnelRequest(const HostPortPair& proxy_server, | 226 void OnBeforeTunnelRequest(const HostPortPair& proxy_server, |
| 227 HttpRequestHeaders* extra_headers) override {} | 227 HttpRequestHeaders* extra_headers) override {} |
| 228 void OnTunnelHeadersReceived( | 228 void OnTunnelHeadersReceived( |
| 229 const HostPortPair& origin, | 229 const HostPortPair& origin, |
| 230 const HostPortPair& proxy_server, | 230 const HostPortPair& proxy_server, |
| 231 const HttpResponseHeaders& response_headers) override {} | 231 const HttpResponseHeaders& response_headers) override {} |
| 232 bool IsTrustedSpdyProxy(const net::ProxyServer& proxy_server) override { | 232 bool IsTrustedSpdyProxy(const net::ProxyServer& proxy_server) override { |
| 233 return true; | 233 return true; |
| 234 } | 234 } |
| 235 void GetAlternativeProxy( |
| 236 const GURL& url, |
| 237 const ProxyServer& resolved_proxy_server, |
| 238 ProxyServer* alternative_proxy_server) const override {} |
| 239 void OnAlternativeProxyBroken( |
| 240 const ProxyServer& alternative_proxy_server) override {} |
| 235 | 241 |
| 236 private: | 242 private: |
| 237 ResolvedProxyInfo resolved_proxy_info_; | 243 ResolvedProxyInfo resolved_proxy_info_; |
| 238 | 244 |
| 239 DISALLOW_COPY_AND_ASSIGN(TestProxyDelegateWithProxyInfo); | 245 DISALLOW_COPY_AND_ASSIGN(TestProxyDelegateWithProxyInfo); |
| 240 }; | 246 }; |
| 241 | 247 |
| 242 class WebSocketEndToEndTest : public ::testing::Test { | 248 class WebSocketEndToEndTest : public ::testing::Test { |
| 243 protected: | 249 protected: |
| 244 WebSocketEndToEndTest() | 250 WebSocketEndToEndTest() |
| (...skipping 266 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 511 GURL ws_url = ws_server.GetURL("header-continuation"); | 517 GURL ws_url = ws_server.GetURL("header-continuation"); |
| 512 | 518 |
| 513 EXPECT_TRUE(ConnectAndWait(ws_url)); | 519 EXPECT_TRUE(ConnectAndWait(ws_url)); |
| 514 EXPECT_EQ("permessage-deflate; server_max_window_bits=10", | 520 EXPECT_EQ("permessage-deflate; server_max_window_bits=10", |
| 515 event_interface_->extensions()); | 521 event_interface_->extensions()); |
| 516 } | 522 } |
| 517 | 523 |
| 518 } // namespace | 524 } // namespace |
| 519 | 525 |
| 520 } // namespace net | 526 } // namespace net |
| OLD | NEW |