Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(253)

Side by Side Diff: net/quic/chromium/quic_chromium_client_session_test.cc

Issue 2521573006: Server push cancellation: change the ownership of ServerPushDelegate to HttpNetworkSession. (Closed)
Patch Set: rebase Created 4 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/chromium/quic_chromium_client_session.h" 5 #include "net/quic/chromium/quic_chromium_client_session.h"
6 6
7 #include "base/base64.h" 7 #include "base/base64.h"
8 #include "base/files/file_path.h" 8 #include "base/files/file_path.h"
9 #include "base/memory/ptr_util.h" 9 #include "base/memory/ptr_util.h"
10 #include "base/rand_util.h" 10 #include "base/rand_util.h"
(...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after
118 session_.reset(new QuicChromiumClientSession( 118 session_.reset(new QuicChromiumClientSession(
119 connection, std::move(socket), 119 connection, std::move(socket),
120 /*stream_factory=*/nullptr, &crypto_client_stream_factory_, &clock_, 120 /*stream_factory=*/nullptr, &crypto_client_stream_factory_, &clock_,
121 &transport_security_state_, 121 &transport_security_state_,
122 base::WrapUnique(static_cast<QuicServerInfo*>(nullptr)), 122 base::WrapUnique(static_cast<QuicServerInfo*>(nullptr)),
123 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), 123 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED),
124 kQuicYieldAfterPacketsRead, 124 kQuicYieldAfterPacketsRead,
125 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), 125 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds),
126 /*cert_verify_flags=*/0, DefaultQuicConfig(), &crypto_config_, 126 /*cert_verify_flags=*/0, DefaultQuicConfig(), &crypto_config_,
127 "CONNECTION_UNKNOWN", base::TimeTicks::Now(), base::TimeTicks::Now(), 127 "CONNECTION_UNKNOWN", base::TimeTicks::Now(), base::TimeTicks::Now(),
128 &push_promise_index_, base::ThreadTaskRunnerHandle::Get().get(), 128 &push_promise_index_, &test_push_delegate_,
129 base::ThreadTaskRunnerHandle::Get().get(),
129 /*socket_performance_watcher=*/nullptr, &net_log_)); 130 /*socket_performance_watcher=*/nullptr, &net_log_));
130 131
131 scoped_refptr<X509Certificate> cert( 132 scoped_refptr<X509Certificate> cert(
132 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); 133 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"));
133 verify_details_.cert_verify_result.verified_cert = cert; 134 verify_details_.cert_verify_result.verified_cert = cert;
134 verify_details_.cert_verify_result.is_issued_by_known_root = true; 135 verify_details_.cert_verify_result.is_issued_by_known_root = true;
135 session_->Initialize(); 136 session_->Initialize();
136 session_->StartReading(); 137 session_->StartReading();
137 writer->set_delegate(session_.get()); 138 writer->set_delegate(session_.get());
138 } 139 }
(...skipping 208 matching lines...) Expand 10 before | Expand all | Expand 10 after
347 nullptr)); 348 nullptr));
348 std::unique_ptr<QuicEncryptedPacket> client_rst(client_maker_.MakeRstPacket( 349 std::unique_ptr<QuicEncryptedPacket> client_rst(client_maker_.MakeRstPacket(
349 2, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT)); 350 2, true, kClientDataStreamId1, QUIC_RST_ACKNOWLEDGEMENT));
350 351
351 MockWrite writes[] = { 352 MockWrite writes[] = {
352 MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), 353 MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1),
353 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; 354 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)};
354 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, 355 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes,
355 arraysize(writes))); 356 arraysize(writes)));
356 Initialize(); 357 Initialize();
357 session_->set_push_delegate(&test_push_delegate_);
358 358
359 ProofVerifyDetailsChromium details; 359 ProofVerifyDetailsChromium details;
360 details.cert_verify_result.verified_cert = 360 details.cert_verify_result.verified_cert =
361 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); 361 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
362 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); 362 ASSERT_TRUE(details.cert_verify_result.verified_cert.get());
363 363
364 CompleteCryptoHandshake(); 364 CompleteCryptoHandshake();
365 session_->OnProofVerifyDetailsAvailable(details); 365 session_->OnProofVerifyDetailsAvailable(details);
366 366
367 QuicChromiumClientStream* stream = 367 QuicChromiumClientStream* stream =
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
404 kDefaultMaxUncompressedHeaderSize, true, 404 kDefaultMaxUncompressedHeaderSize, true,
405 nullptr)); 405 nullptr));
406 std::unique_ptr<QuicEncryptedPacket> client_rst(client_maker_.MakeRstPacket( 406 std::unique_ptr<QuicEncryptedPacket> client_rst(client_maker_.MakeRstPacket(
407 2, true, kServerDataStreamId1, QUIC_STREAM_CANCELLED)); 407 2, true, kServerDataStreamId1, QUIC_STREAM_CANCELLED));
408 MockWrite writes[] = { 408 MockWrite writes[] = {
409 MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), 409 MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1),
410 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; 410 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)};
411 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, 411 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes,
412 arraysize(writes))); 412 arraysize(writes)));
413 Initialize(); 413 Initialize();
414 session_->set_push_delegate(&test_push_delegate_);
415 414
416 ProofVerifyDetailsChromium details; 415 ProofVerifyDetailsChromium details;
417 details.cert_verify_result.verified_cert = 416 details.cert_verify_result.verified_cert =
418 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); 417 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
419 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); 418 ASSERT_TRUE(details.cert_verify_result.verified_cert.get());
420 419
421 CompleteCryptoHandshake(); 420 CompleteCryptoHandshake();
422 session_->OnProofVerifyDetailsAvailable(details); 421 session_->OnProofVerifyDetailsAvailable(details);
423 422
424 QuicChromiumClientStream* stream = 423 QuicChromiumClientStream* stream =
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
457 kDefaultMaxUncompressedHeaderSize, true, 456 kDefaultMaxUncompressedHeaderSize, true,
458 nullptr)); 457 nullptr));
459 std::unique_ptr<QuicEncryptedPacket> client_rst(client_maker_.MakeRstPacket( 458 std::unique_ptr<QuicEncryptedPacket> client_rst(client_maker_.MakeRstPacket(
460 2, true, kServerDataStreamId1, QUIC_STREAM_CANCELLED)); 459 2, true, kServerDataStreamId1, QUIC_STREAM_CANCELLED));
461 MockWrite writes[] = { 460 MockWrite writes[] = {
462 MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1), 461 MockWrite(ASYNC, settings_packet->data(), settings_packet->length(), 1),
463 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)}; 462 MockWrite(ASYNC, client_rst->data(), client_rst->length(), 2)};
464 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes, 463 socket_data_.reset(new SequencedSocketData(reads, arraysize(reads), writes,
465 arraysize(writes))); 464 arraysize(writes)));
466 Initialize(); 465 Initialize();
467 session_->set_push_delegate(&test_push_delegate_);
468 466
469 ProofVerifyDetailsChromium details; 467 ProofVerifyDetailsChromium details;
470 details.cert_verify_result.verified_cert = 468 details.cert_verify_result.verified_cert =
471 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); 469 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
472 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); 470 ASSERT_TRUE(details.cert_verify_result.verified_cert.get());
473 471
474 CompleteCryptoHandshake(); 472 CompleteCryptoHandshake();
475 session_->OnProofVerifyDetailsAvailable(details); 473 session_->OnProofVerifyDetailsAvailable(details);
476 474
477 QuicChromiumClientStream* stream = 475 QuicChromiumClientStream* stream =
(...skipping 448 matching lines...) Expand 10 before | Expand all | Expand 10 after
926 924
927 EXPECT_TRUE(socket_data_->AllReadDataConsumed()); 925 EXPECT_TRUE(socket_data_->AllReadDataConsumed());
928 EXPECT_TRUE(socket_data_->AllWriteDataConsumed()); 926 EXPECT_TRUE(socket_data_->AllWriteDataConsumed());
929 EXPECT_TRUE(new_socket_data.AllReadDataConsumed()); 927 EXPECT_TRUE(new_socket_data.AllReadDataConsumed());
930 EXPECT_TRUE(new_socket_data.AllWriteDataConsumed()); 928 EXPECT_TRUE(new_socket_data.AllWriteDataConsumed());
931 } 929 }
932 930
933 } // namespace 931 } // namespace
934 } // namespace test 932 } // namespace test
935 } // namespace net 933 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/chromium/quic_chromium_client_session.cc ('k') | net/quic/chromium/quic_http_stream_test.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698