| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/net_log/net_log_file_writer.h" | 5 #include "components/net_log/net_log_file_writer.h" |
| 6 | 6 |
| 7 #include <stdint.h> | 7 #include <stdint.h> |
| 8 | 8 |
| 9 #include <memory> | 9 #include <memory> |
| 10 | 10 |
| 11 #include "base/command_line.h" | 11 #include "base/command_line.h" |
| 12 #include "base/files/file_path.h" | 12 #include "base/files/file_path.h" |
| 13 #include "base/files/file_util.h" | 13 #include "base/files/file_util.h" |
| 14 #include "base/files/scoped_file.h" | 14 #include "base/files/scoped_file.h" |
| 15 #include "base/files/scoped_temp_dir.h" | 15 #include "base/files/scoped_temp_dir.h" |
| 16 #include "base/json/json_reader.h" | 16 #include "base/json/json_reader.h" |
| 17 #include "base/message_loop/message_loop.h" | 17 #include "base/message_loop/message_loop.h" |
| 18 #include "base/run_loop.h" |
| 19 #include "base/threading/thread.h" |
| 20 #include "base/threading/thread_task_runner_handle.h" |
| 18 #include "base/values.h" | 21 #include "base/values.h" |
| 19 #include "build/build_config.h" | 22 #include "build/build_config.h" |
| 20 #include "components/net_log/chrome_net_log.h" | 23 #include "components/net_log/chrome_net_log.h" |
| 24 #include "net/base/test_completion_callback.h" |
| 25 #include "net/http/http_network_session.h" |
| 21 #include "net/log/net_log_capture_mode.h" | 26 #include "net/log/net_log_capture_mode.h" |
| 22 #include "net/log/net_log_event_type.h" | 27 #include "net/log/net_log_event_type.h" |
| 23 #include "net/log/write_to_file_net_log_observer.h" | 28 #include "net/log/write_to_file_net_log_observer.h" |
| 29 #include "net/url_request/url_request_context_getter.h" |
| 30 #include "net/url_request/url_request_test_util.h" |
| 24 #include "testing/gtest/include/gtest/gtest.h" | 31 #include "testing/gtest/include/gtest/gtest.h" |
| 25 | 32 |
| 26 namespace { | 33 namespace { |
| 27 | 34 |
| 28 const char kChannelString[] = "SomeChannel"; | 35 const char kChannelString[] = "SomeChannel"; |
| 29 | 36 |
| 37 // Keep this in sync with kLogRelativePath defined in net_log_file_writer.cc. |
| 38 base::FilePath::CharType kLogRelativePath[] = |
| 39 FILE_PATH_LITERAL("net-export/chrome-net-export-log.json"); |
| 40 |
| 41 const char kCaptureModeDefaultString[] = "STRIP_PRIVATE_DATA"; |
| 42 const char kCaptureModeIncludeCookiesAndCredentialsString[] = "NORMAL"; |
| 43 const char kCaptureModeIncludeSocketBytesString[] = "LOG_BYTES"; |
| 44 |
| 45 const char kStateUninitializedString[] = "UNINITIALIZED"; |
| 46 const char kStateNotLoggingString[] = "NOT_LOGGING"; |
| 47 const char kStateLoggingString[] = "LOGGING"; |
| 48 |
| 30 } // namespace | 49 } // namespace |
| 31 | 50 |
| 32 namespace net_log { | 51 namespace net_log { |
| 33 | 52 |
| 34 class TestNetLogFileWriter : public NetLogFileWriter { | 53 // Sets |path| to |path_to_return| and always returns true. This function is |
| 54 // used to override NetLogFileWriter's usual getter for the default log base |
| 55 // directory. |
| 56 bool SetPathToGivenAndReturnTrue(const base::FilePath& path_to_return, |
| 57 base::FilePath* path) { |
| 58 *path = path_to_return; |
| 59 return true; |
| 60 } |
| 61 |
| 62 // Checks the fields of the state returned by NetLogFileWriter's state callback. |
| 63 // |expected_log_capture_mode_string| is only checked if |
| 64 // |expected_log_capture_mode_known| is true. |
| 65 void VerifyState(const base::DictionaryValue& state, |
| 66 const std::string& expected_state_string, |
| 67 bool expected_log_exists, |
| 68 bool expected_log_capture_mode_known, |
| 69 const std::string& expected_log_capture_mode_string) { |
| 70 std::string state_string; |
| 71 ASSERT_TRUE(state.GetString("state", &state_string)); |
| 72 EXPECT_EQ(state_string, expected_state_string); |
| 73 |
| 74 bool log_exists; |
| 75 ASSERT_TRUE(state.GetBoolean("logExists", &log_exists)); |
| 76 EXPECT_EQ(log_exists, expected_log_exists); |
| 77 |
| 78 bool log_capture_mode_known; |
| 79 ASSERT_TRUE(state.GetBoolean("logCaptureModeKnown", &log_capture_mode_known)); |
| 80 EXPECT_EQ(log_capture_mode_known, expected_log_capture_mode_known); |
| 81 |
| 82 if (expected_log_capture_mode_known) { |
| 83 std::string log_capture_mode_string; |
| 84 ASSERT_TRUE(state.GetString("captureMode", &log_capture_mode_string)); |
| 85 EXPECT_EQ(log_capture_mode_string, expected_log_capture_mode_string); |
| 86 } |
| 87 } |
| 88 |
| 89 ::testing::AssertionResult ReadCompleteLogFile( |
| 90 const base::FilePath& log_path, |
| 91 std::unique_ptr<base::DictionaryValue>* root) { |
| 92 DCHECK(!log_path.empty()); |
| 93 |
| 94 if (!base::PathExists(log_path)) { |
| 95 return ::testing::AssertionFailure() << log_path.value() |
| 96 << " does not exist."; |
| 97 } |
| 98 // Parse log file contents into a dictionary |
| 99 std::string log_string; |
| 100 if (!base::ReadFileToString(log_path, &log_string)) { |
| 101 return ::testing::AssertionFailure() << log_path.value() |
| 102 << " could not be read."; |
| 103 } |
| 104 *root = base::DictionaryValue::From(base::JSONReader::Read(log_string)); |
| 105 if (!*root) { |
| 106 return ::testing::AssertionFailure() |
| 107 << "Contents of " << log_path.value() |
| 108 << " do not form valid JSON dictionary."; |
| 109 } |
| 110 // Make sure the "constants" section exists |
| 111 base::DictionaryValue* constants; |
| 112 if (!(*root)->GetDictionary("constants", &constants)) { |
| 113 root->reset(); |
| 114 return ::testing::AssertionFailure() << log_path.value() |
| 115 << " does not contain constants."; |
| 116 } |
| 117 // Make sure the "events" section exists |
| 118 base::ListValue* events; |
| 119 if (!(*root)->GetList("events", &events)) { |
| 120 root->reset(); |
| 121 return ::testing::AssertionFailure() << log_path.value() |
| 122 << " does not contain events list."; |
| 123 } |
| 124 return ::testing::AssertionSuccess(); |
| 125 } |
| 126 |
| 127 void SetUpTestContextGetterWithQuicTimeoutInfo( |
| 128 net::NetLog* net_log, |
| 129 int quic_idle_connection_timeout_seconds, |
| 130 scoped_refptr<net::TestURLRequestContextGetter>* context_getter) { |
| 131 std::unique_ptr<net::TestURLRequestContext> context = |
| 132 base::MakeUnique<net::TestURLRequestContext>(true); |
| 133 context->set_net_log(net_log); |
| 134 |
| 135 std::unique_ptr<net::HttpNetworkSession::Params> params( |
| 136 new net::HttpNetworkSession::Params); |
| 137 params->quic_idle_connection_timeout_seconds = |
| 138 quic_idle_connection_timeout_seconds; |
| 139 |
| 140 context->set_http_network_session_params(std::move(params)); |
| 141 context->Init(); |
| 142 |
| 143 *context_getter = new net::TestURLRequestContextGetter( |
| 144 base::ThreadTaskRunnerHandle::Get(), std::move(context)); |
| 145 } |
| 146 |
| 147 // A class that wraps around TestClosure. Provides the ability to wait on a |
| 148 // state callback and retrieve the result. |
| 149 class TestStateCallback { |
| 35 public: | 150 public: |
| 36 explicit TestNetLogFileWriter(ChromeNetLog* chrome_net_log) | 151 TestStateCallback() |
| 37 : NetLogFileWriter( | 152 : callback_(base::Bind(&TestStateCallback::SetResultThenNotify, |
| 38 chrome_net_log, | 153 base::Unretained(this))) {} |
| 39 base::CommandLine::ForCurrentProcess()->GetCommandLineString(), | 154 |
| 40 kChannelString), | 155 const base::Callback<void(std::unique_ptr<base::DictionaryValue>)>& callback() |
| 41 lie_about_net_export_log_directory_(false) { | 156 const { |
| 42 EXPECT_TRUE(net_log_temp_dir_.CreateUniqueTempDir()); | 157 return callback_; |
| 43 } | 158 } |
| 44 | 159 |
| 45 ~TestNetLogFileWriter() override { EXPECT_TRUE(net_log_temp_dir_.Delete()); } | 160 std::unique_ptr<base::DictionaryValue> WaitForResult() { |
| 46 | 161 test_closure_.WaitForResult(); |
| 47 // NetLogFileWriter implementation: | 162 return std::move(result_); |
| 48 bool GetNetExportLogBaseDirectory(base::FilePath* path) const override { | |
| 49 if (lie_about_net_export_log_directory_) | |
| 50 return false; | |
| 51 *path = net_log_temp_dir_.GetPath(); | |
| 52 return true; | |
| 53 } | |
| 54 | |
| 55 void set_lie_about_net_export_log_directory( | |
| 56 bool lie_about_net_export_log_directory) { | |
| 57 lie_about_net_export_log_directory_ = lie_about_net_export_log_directory; | |
| 58 } | 163 } |
| 59 | 164 |
| 60 private: | 165 private: |
| 61 bool lie_about_net_export_log_directory_; | 166 void SetResultThenNotify(std::unique_ptr<base::DictionaryValue> result) { |
| 62 | 167 result_ = std::move(result); |
| 63 base::ScopedTempDir net_log_temp_dir_; | 168 test_closure_.closure().Run(); |
| 169 } |
| 170 |
| 171 net::TestClosure test_closure_; |
| 172 std::unique_ptr<base::DictionaryValue> result_; |
| 173 base::Callback<void(std::unique_ptr<base::DictionaryValue>)> callback_; |
| 174 }; |
| 175 |
| 176 // A class that wraps around TestClosure. Provides the ability to wait on a |
| 177 // file path callback and retrieve the result. |
| 178 class TestFilePathCallback { |
| 179 public: |
| 180 TestFilePathCallback() |
| 181 : callback_(base::Bind(&TestFilePathCallback::SetResultThenNotify, |
| 182 base::Unretained(this))) {} |
| 183 |
| 184 const base::Callback<void(const base::FilePath&)>& callback() const { |
| 185 return callback_; |
| 186 } |
| 187 |
| 188 const base::FilePath& WaitForResult() { |
| 189 test_closure_.WaitForResult(); |
| 190 return result_; |
| 191 } |
| 192 |
| 193 private: |
| 194 void SetResultThenNotify(const base::FilePath& result) { |
| 195 result_ = result; |
| 196 test_closure_.closure().Run(); |
| 197 } |
| 198 |
| 199 net::TestClosure test_closure_; |
| 200 base::FilePath result_; |
| 201 base::Callback<void(const base::FilePath&)> callback_; |
| 64 }; | 202 }; |
| 65 | 203 |
| 66 class NetLogFileWriterTest : public ::testing::Test { | 204 class NetLogFileWriterTest : public ::testing::Test { |
| 67 public: | 205 public: |
| 68 NetLogFileWriterTest() | 206 NetLogFileWriterTest() |
| 69 : net_log_(new ChromeNetLog( | 207 : net_log_(base::FilePath(), |
| 70 base::FilePath(), | 208 net::NetLogCaptureMode::Default(), |
| 71 net::NetLogCaptureMode::Default(), | 209 base::CommandLine::ForCurrentProcess()->GetCommandLineString(), |
| 210 kChannelString), |
| 211 net_log_file_writer_( |
| 212 &net_log_, |
| 72 base::CommandLine::ForCurrentProcess()->GetCommandLineString(), | 213 base::CommandLine::ForCurrentProcess()->GetCommandLineString(), |
| 73 kChannelString)), | 214 kChannelString), |
| 74 net_log_file_writer_(new TestNetLogFileWriter(net_log_.get())) {} | 215 file_thread_("NetLogFileWriter file thread"), |
| 75 | 216 net_thread_("NetLogFileWriter net thread") {} |
| 76 std::string GetStateString() const { | 217 |
| 77 std::unique_ptr<base::DictionaryValue> dict( | 218 // ::testing::Test implementation |
| 78 net_log_file_writer_->GetState()); | 219 void SetUp() override { |
| 79 std::string state; | 220 ASSERT_TRUE(log_temp_dir_.CreateUniqueTempDir()); |
| 80 EXPECT_TRUE(dict->GetString("state", &state)); | 221 |
| 81 return state; | 222 // Override |net_log_file_writer_|'s default-log-base-directory-getter to |
| 82 } | 223 // a getter that returns the temp dir created for the test. |
| 83 | 224 net_log_file_writer_.SetDefaultLogBaseDirectoryGetterForTest( |
| 84 std::string GetLogTypeString() const { | 225 base::Bind(&SetPathToGivenAndReturnTrue, log_temp_dir_.GetPath())); |
| 85 std::unique_ptr<base::DictionaryValue> dict( | 226 |
| 86 net_log_file_writer_->GetState()); | 227 default_log_path_ = log_temp_dir_.GetPath().Append(kLogRelativePath); |
| 87 std::string log_type; | 228 |
| 88 EXPECT_TRUE(dict->GetString("logType", &log_type)); | 229 ASSERT_TRUE(file_thread_.Start()); |
| 89 return log_type; | 230 ASSERT_TRUE(net_thread_.Start()); |
| 90 } | 231 |
| 91 | 232 net_log_file_writer_.SetTaskRunners(file_thread_.task_runner(), |
| 92 // Make sure the export file has been created and is non-empty, as net | 233 net_thread_.task_runner()); |
| 93 // constants will always be written to it on creation. | 234 } |
| 94 void VerifyNetExportLogExists() { | 235 void TearDown() override { ASSERT_TRUE(log_temp_dir_.Delete()); } |
| 95 net_export_log_ = net_log_file_writer_->log_path_; | 236 |
| 96 ASSERT_TRUE(base::PathExists(net_export_log_)); | 237 std::unique_ptr<base::DictionaryValue> FileWriterGetState() { |
| 97 | 238 TestStateCallback test_callback; |
| 98 int64_t file_size; | 239 net_log_file_writer_.GetState(test_callback.callback()); |
| 99 // base::GetFileSize returns proper file size on open handles. | 240 return test_callback.WaitForResult(); |
| 100 ASSERT_TRUE(base::GetFileSize(net_export_log_, &file_size)); | 241 } |
| 101 EXPECT_GT(file_size, 0); | 242 |
| 102 } | 243 base::FilePath FileWriterGetFilePathToCompletedLog() { |
| 103 | 244 TestFilePathCallback test_callback; |
| 104 // Make sure the export file has been created and a valid JSON file. This | 245 net_log_file_writer_.GetFilePathToCompletedLog(test_callback.callback()); |
| 105 // should always be the case once logging has been stopped. | 246 return test_callback.WaitForResult(); |
| 106 void VerifyNetExportLogComplete() { | 247 } |
| 107 VerifyNetExportLogExists(); | 248 |
| 108 | 249 // If |custom_log_path| is empty path, |net_log_file_writer_| will use its |
| 109 std::string log; | 250 // default log path. |
| 110 ASSERT_TRUE(ReadFileToString(net_export_log_, &log)); | 251 void StartThenVerifyState(const base::FilePath& custom_log_path, |
| 111 base::JSONReader reader; | 252 net::NetLogCaptureMode capture_mode, |
| 112 std::unique_ptr<base::Value> json = base::JSONReader::Read(log); | 253 const std::string& expected_capture_mode_string) { |
| 113 EXPECT_TRUE(json); | 254 TestStateCallback test_callback; |
| 114 } | 255 net_log_file_writer_.StartNetLog(custom_log_path, capture_mode, |
| 115 | 256 test_callback.callback()); |
| 116 // Verify state and GetFilePath return correct values if EnsureInit() fails. | 257 std::unique_ptr<base::DictionaryValue> state = |
| 117 void VerifyFilePathAndStateAfterEnsureInitFailure() { | 258 test_callback.WaitForResult(); |
| 118 EXPECT_EQ("UNINITIALIZED", GetStateString()); | 259 VerifyState(*state, kStateLoggingString, true, true, |
| 119 EXPECT_EQ(NetLogFileWriter::STATE_UNINITIALIZED, | 260 expected_capture_mode_string); |
| 120 net_log_file_writer_->state()); | 261 |
| 121 | 262 // Make sure NetLogFileWriter::GetFilePath() returns empty path when |
| 122 base::FilePath net_export_file_path; | 263 // logging. |
| 123 EXPECT_FALSE(net_log_file_writer_->GetFilePath(&net_export_file_path)); | 264 EXPECT_TRUE(FileWriterGetFilePathToCompletedLog().empty()); |
| 124 } | 265 } |
| 125 | 266 |
| 126 // When we lie in NetExportLogExists, make sure state and GetFilePath return | 267 // If |custom_log_path| is empty path, it's assumed the log file with be at |
| 127 // correct values. | 268 // |default_path_|. |
| 128 void VerifyFilePathAndStateAfterEnsureInit() { | 269 void StopThenVerifyStateAndFile( |
| 129 EXPECT_EQ("NOT_LOGGING", GetStateString()); | 270 const base::FilePath& custom_log_path, |
| 130 EXPECT_EQ(NetLogFileWriter::STATE_NOT_LOGGING, | 271 std::unique_ptr<base::DictionaryValue> polled_data, |
| 131 net_log_file_writer_->state()); | 272 scoped_refptr<net::URLRequestContextGetter> context_getter, |
| 132 EXPECT_EQ("NONE", GetLogTypeString()); | 273 const std::string& expected_capture_mode_string) { |
| 133 EXPECT_EQ(NetLogFileWriter::LOG_TYPE_NONE, | 274 TestStateCallback test_callback; |
| 134 net_log_file_writer_->log_type()); | 275 net_log_file_writer_.StopNetLog(std::move(polled_data), context_getter, |
| 135 | 276 test_callback.callback()); |
| 136 base::FilePath net_export_file_path; | 277 std::unique_ptr<base::DictionaryValue> state = |
| 137 EXPECT_FALSE(net_log_file_writer_->GetFilePath(&net_export_file_path)); | 278 test_callback.WaitForResult(); |
| 138 EXPECT_FALSE(net_log_file_writer_->NetExportLogExists()); | 279 VerifyState(*state, kStateNotLoggingString, true, true, |
| 139 } | 280 expected_capture_mode_string); |
| 140 | 281 |
| 141 // The following methods make sure the export file has been successfully | 282 const base::FilePath& log_path = |
| 142 // initialized by a DO_START command of the given type. | 283 custom_log_path.empty() ? default_log_path_ : custom_log_path; |
| 143 | 284 EXPECT_EQ(FileWriterGetFilePathToCompletedLog(), log_path); |
| 144 void VerifyFileAndStateAfterDoStart() { | 285 |
| 145 VerifyFileAndStateAfterStart( | 286 std::unique_ptr<base::DictionaryValue> root; |
| 146 NetLogFileWriter::LOG_TYPE_NORMAL, "NORMAL", | 287 ASSERT_TRUE(ReadCompleteLogFile(log_path, &root)); |
| 147 net::NetLogCaptureMode::IncludeCookiesAndCredentials()); | 288 } |
| 148 } | 289 |
| 149 | 290 protected: |
| 150 void VerifyFileAndStateAfterDoStartStripPrivateData() { | 291 ChromeNetLog net_log_; |
| 151 VerifyFileAndStateAfterStart(NetLogFileWriter::LOG_TYPE_STRIP_PRIVATE_DATA, | 292 |
| 152 "STRIP_PRIVATE_DATA", | |
| 153 net::NetLogCaptureMode::Default()); | |
| 154 } | |
| 155 | |
| 156 void VerifyFileAndStateAfterDoStartLogBytes() { | |
| 157 VerifyFileAndStateAfterStart(NetLogFileWriter::LOG_TYPE_LOG_BYTES, | |
| 158 "LOG_BYTES", | |
| 159 net::NetLogCaptureMode::IncludeSocketBytes()); | |
| 160 } | |
| 161 | |
| 162 // Make sure the export file has been successfully initialized after DO_STOP | |
| 163 // command following a DO_START command of the given type. | |
| 164 | |
| 165 void VerifyFileAndStateAfterDoStop() { | |
| 166 VerifyFileAndStateAfterDoStop(NetLogFileWriter::LOG_TYPE_NORMAL, "NORMAL"); | |
| 167 } | |
| 168 | |
| 169 void VerifyFileAndStateAfterDoStopWithStripPrivateData() { | |
| 170 VerifyFileAndStateAfterDoStop(NetLogFileWriter::LOG_TYPE_STRIP_PRIVATE_DATA, | |
| 171 "STRIP_PRIVATE_DATA"); | |
| 172 } | |
| 173 | |
| 174 void VerifyFileAndStateAfterDoStopWithLogBytes() { | |
| 175 VerifyFileAndStateAfterDoStop(NetLogFileWriter::LOG_TYPE_LOG_BYTES, | |
| 176 "LOG_BYTES"); | |
| 177 } | |
| 178 | |
| 179 std::unique_ptr<ChromeNetLog> net_log_; | |
| 180 // |net_log_file_writer_| is initialized after |net_log_| so that it can stop | 293 // |net_log_file_writer_| is initialized after |net_log_| so that it can stop |
| 181 // obvserving on destruction. | 294 // obvserving on destruction. |
| 182 std::unique_ptr<TestNetLogFileWriter> net_log_file_writer_; | 295 NetLogFileWriter net_log_file_writer_; |
| 183 base::FilePath net_export_log_; | 296 |
| 297 base::ScopedTempDir log_temp_dir_; |
| 298 |
| 299 // The default log path that |net_log_file_writer_| will use is cached here. |
| 300 base::FilePath default_log_path_; |
| 301 |
| 302 base::Thread file_thread_; |
| 303 base::Thread net_thread_; |
| 184 | 304 |
| 185 private: | 305 private: |
| 186 // Checks state after one of the DO_START* commands. | 306 // Allows tasks to be posted to the main thread. |
| 187 void VerifyFileAndStateAfterStart( | |
| 188 NetLogFileWriter::LogType expected_log_type, | |
| 189 const std::string& expected_log_type_string, | |
| 190 net::NetLogCaptureMode expected_capture_mode) { | |
| 191 EXPECT_EQ(NetLogFileWriter::STATE_LOGGING, net_log_file_writer_->state()); | |
| 192 EXPECT_EQ("LOGGING", GetStateString()); | |
| 193 EXPECT_EQ(expected_log_type, net_log_file_writer_->log_type()); | |
| 194 EXPECT_EQ(expected_log_type_string, GetLogTypeString()); | |
| 195 EXPECT_EQ(expected_capture_mode, | |
| 196 net_log_file_writer_->write_to_file_observer_->capture_mode()); | |
| 197 | |
| 198 // Check GetFilePath returns false when still writing to the file. | |
| 199 base::FilePath net_export_file_path; | |
| 200 EXPECT_FALSE(net_log_file_writer_->GetFilePath(&net_export_file_path)); | |
| 201 | |
| 202 VerifyNetExportLogExists(); | |
| 203 } | |
| 204 | |
| 205 void VerifyFileAndStateAfterDoStop( | |
| 206 NetLogFileWriter::LogType expected_log_type, | |
| 207 const std::string& expected_log_type_string) { | |
| 208 EXPECT_EQ(NetLogFileWriter::STATE_NOT_LOGGING, | |
| 209 net_log_file_writer_->state()); | |
| 210 EXPECT_EQ("NOT_LOGGING", GetStateString()); | |
| 211 EXPECT_EQ(expected_log_type, net_log_file_writer_->log_type()); | |
| 212 EXPECT_EQ(expected_log_type_string, GetLogTypeString()); | |
| 213 | |
| 214 base::FilePath net_export_file_path; | |
| 215 EXPECT_TRUE(net_log_file_writer_->GetFilePath(&net_export_file_path)); | |
| 216 EXPECT_EQ(net_export_log_, net_export_file_path); | |
| 217 | |
| 218 VerifyNetExportLogComplete(); | |
| 219 } | |
| 220 | |
| 221 base::MessageLoop message_loop_; | 307 base::MessageLoop message_loop_; |
| 222 }; | 308 }; |
| 223 | 309 |
| 224 TEST_F(NetLogFileWriterTest, EnsureInitFailure) { | 310 TEST_F(NetLogFileWriterTest, InitFail) { |
| 225 net_log_file_writer_->set_lie_about_net_export_log_directory(true); | 311 // Override net_log_file_writer_'s default log base directory getter to always |
| 226 | 312 // fail. |
| 227 EXPECT_FALSE(net_log_file_writer_->EnsureInit()); | 313 net_log_file_writer_.SetDefaultLogBaseDirectoryGetterForTest( |
| 228 VerifyFilePathAndStateAfterEnsureInitFailure(); | 314 base::Bind([](base::FilePath* path) -> bool { return false; })); |
| 229 | 315 |
| 230 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | 316 // GetState() will cause |net_log_file_writer_| to initialize. In this case, |
| 231 VerifyFilePathAndStateAfterEnsureInitFailure(); | 317 // initialization will fail since |net_log_file_writer_| will fail to |
| 232 } | 318 // retrieve the default log base directory. |
| 233 | 319 VerifyState(*FileWriterGetState(), kStateUninitializedString, false, false, |
| 234 TEST_F(NetLogFileWriterTest, EnsureInitAllowStart) { | 320 ""); |
| 235 EXPECT_TRUE(net_log_file_writer_->EnsureInit()); | 321 |
| 236 VerifyFilePathAndStateAfterEnsureInit(); | 322 // NetLogFileWriter::GetFilePath() should return empty path if uninitialized. |
| 237 | 323 EXPECT_TRUE(FileWriterGetFilePathToCompletedLog().empty()); |
| 238 // Calling EnsureInit() second time should be a no-op. | 324 } |
| 239 EXPECT_TRUE(net_log_file_writer_->EnsureInit()); | 325 |
| 240 VerifyFilePathAndStateAfterEnsureInit(); | 326 TEST_F(NetLogFileWriterTest, InitWithoutExistingLog) { |
| 241 | 327 // GetState() will cause |net_log_file_writer_| to initialize. |
| 242 // GetFilePath() should failed when there's no file. | 328 VerifyState(*FileWriterGetState(), kStateNotLoggingString, false, false, ""); |
| 243 base::FilePath net_export_file_path; | 329 |
| 244 EXPECT_FALSE(net_log_file_writer_->GetFilePath(&net_export_file_path)); | 330 // NetLogFileWriter::GetFilePathToCompletedLog() should return empty path when |
| 245 } | 331 // no log file exists. |
| 246 | 332 EXPECT_TRUE(FileWriterGetFilePathToCompletedLog().empty()); |
| 247 TEST_F(NetLogFileWriterTest, EnsureInitAllowStartOrSend) { | 333 } |
| 248 net_log_file_writer_->SetUpDefaultNetExportLogPath(); | 334 |
| 249 net_export_log_ = net_log_file_writer_->log_path_; | 335 TEST_F(NetLogFileWriterTest, InitWithExistingLog) { |
| 250 | 336 // Create and close an empty log file to simulate existence of a previous log |
| 251 // Create and close an empty log file, to simulate an old log file already | 337 // file. |
| 252 // existing. | 338 ASSERT_TRUE( |
| 253 base::ScopedFILE created_file(base::OpenFile(net_export_log_, "w")); | 339 base::CreateDirectoryAndGetError(default_log_path_.DirName(), nullptr)); |
| 254 ASSERT_TRUE(created_file.get()); | 340 base::ScopedFILE empty_file(base::OpenFile(default_log_path_, "w")); |
| 255 created_file.reset(); | 341 ASSERT_TRUE(empty_file.get()); |
| 256 | 342 empty_file.reset(); |
| 257 EXPECT_TRUE(net_log_file_writer_->EnsureInit()); | 343 |
| 258 | 344 // GetState() will cause |net_log_file_writer_| to initialize. |
| 259 EXPECT_EQ("NOT_LOGGING", GetStateString()); | 345 VerifyState(*FileWriterGetState(), kStateNotLoggingString, true, false, ""); |
| 260 EXPECT_EQ(NetLogFileWriter::STATE_NOT_LOGGING, net_log_file_writer_->state()); | 346 |
| 261 EXPECT_EQ("UNKNOWN", GetLogTypeString()); | 347 EXPECT_EQ(FileWriterGetFilePathToCompletedLog(), default_log_path_); |
| 262 EXPECT_EQ(NetLogFileWriter::LOG_TYPE_UNKNOWN, | 348 } |
| 263 net_log_file_writer_->log_type()); | 349 |
| 264 EXPECT_EQ(net_export_log_, net_log_file_writer_->log_path_); | 350 TEST_F(NetLogFileWriterTest, StartAndStopWithAllCaptureModes) { |
| 265 EXPECT_TRUE(base::PathExists(net_export_log_)); | 351 const net::NetLogCaptureMode capture_modes[3] = { |
| 266 | 352 net::NetLogCaptureMode::Default(), |
| 267 base::FilePath net_export_file_path; | 353 net::NetLogCaptureMode::IncludeCookiesAndCredentials(), |
| 268 EXPECT_TRUE(net_log_file_writer_->GetFilePath(&net_export_file_path)); | 354 net::NetLogCaptureMode::IncludeSocketBytes()}; |
| 269 EXPECT_TRUE(base::PathExists(net_export_file_path)); | 355 |
| 270 EXPECT_EQ(net_export_log_, net_export_file_path); | 356 const std::string capture_mode_strings[3] = { |
| 271 } | 357 kCaptureModeDefaultString, kCaptureModeIncludeCookiesAndCredentialsString, |
| 272 | 358 kCaptureModeIncludeSocketBytesString}; |
| 273 TEST_F(NetLogFileWriterTest, ProcessCommandDoStartAndStop) { | 359 |
| 274 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | 360 // For each capture mode, start and stop |net_log_file_writer_| in that mode. |
| 275 VerifyFileAndStateAfterDoStart(); | 361 for (int i = 0; i < 3; ++i) { |
| 276 | 362 StartThenVerifyState(base::FilePath(), capture_modes[i], |
| 277 // Calling a second time should be a no-op. | 363 capture_mode_strings[i]); |
| 278 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | 364 |
| 279 VerifyFileAndStateAfterDoStart(); | 365 // Starting a second time should be a no-op. |
| 280 | 366 StartThenVerifyState(base::FilePath(), capture_modes[i], |
| 281 // starting with other log levels should also be no-ops. | 367 capture_mode_strings[i]); |
| 282 net_log_file_writer_->ProcessCommand( | 368 |
| 283 NetLogFileWriter::DO_START_STRIP_PRIVATE_DATA); | 369 // Starting with other capture modes should also be no-ops. This should also |
| 284 VerifyFileAndStateAfterDoStart(); | 370 // not affect the capture mode reported by |net_log_file_writer_|. |
| 285 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START_LOG_BYTES); | 371 StartThenVerifyState(base::FilePath(), capture_modes[(i + 1) % 3], |
| 286 VerifyFileAndStateAfterDoStart(); | 372 capture_mode_strings[i]); |
| 287 | 373 |
| 288 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | 374 StartThenVerifyState(base::FilePath(), capture_modes[(i + 2) % 3], |
| 289 VerifyFileAndStateAfterDoStop(); | 375 capture_mode_strings[i]); |
| 290 | 376 |
| 291 // Calling DO_STOP second time should be a no-op. | 377 StopThenVerifyStateAndFile(base::FilePath(), nullptr, nullptr, |
| 292 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | 378 capture_mode_strings[i]); |
| 293 VerifyFileAndStateAfterDoStop(); | 379 |
| 294 } | 380 // Stopping a second time should be a no-op. |
| 295 | 381 StopThenVerifyStateAndFile(base::FilePath(), nullptr, nullptr, |
| 296 TEST_F(NetLogFileWriterTest, | 382 capture_mode_strings[i]); |
| 297 ProcessCommandDoStartAndStopWithPrivateDataStripping) { | 383 } |
| 298 net_log_file_writer_->ProcessCommand( | 384 } |
| 299 NetLogFileWriter::DO_START_STRIP_PRIVATE_DATA); | 385 |
| 300 VerifyFileAndStateAfterDoStartStripPrivateData(); | 386 // Verify the file sizes after two consecutive starts/stops are the same (even |
| 301 | 387 // if some junk data is added in between). |
| 302 // Calling a second time should be a no-op. | 388 TEST_F(NetLogFileWriterTest, StartClearsFile) { |
| 303 net_log_file_writer_->ProcessCommand( | 389 StartThenVerifyState(base::FilePath(), net::NetLogCaptureMode::Default(), |
| 304 NetLogFileWriter::DO_START_STRIP_PRIVATE_DATA); | 390 kCaptureModeDefaultString); |
| 305 VerifyFileAndStateAfterDoStartStripPrivateData(); | 391 |
| 306 | 392 StopThenVerifyStateAndFile(base::FilePath(), nullptr, nullptr, |
| 307 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | 393 kCaptureModeDefaultString); |
| 308 VerifyFileAndStateAfterDoStopWithStripPrivateData(); | |
| 309 | |
| 310 // Calling DO_STOP second time should be a no-op. | |
| 311 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | |
| 312 VerifyFileAndStateAfterDoStopWithStripPrivateData(); | |
| 313 } | |
| 314 | |
| 315 TEST_F(NetLogFileWriterTest, ProcessCommandDoStartAndStopWithByteLogging) { | |
| 316 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START_LOG_BYTES); | |
| 317 VerifyFileAndStateAfterDoStartLogBytes(); | |
| 318 | |
| 319 // Calling a second time should be a no-op. | |
| 320 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START_LOG_BYTES); | |
| 321 VerifyFileAndStateAfterDoStartLogBytes(); | |
| 322 | |
| 323 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | |
| 324 VerifyFileAndStateAfterDoStopWithLogBytes(); | |
| 325 | |
| 326 // Calling DO_STOP second time should be a no-op. | |
| 327 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | |
| 328 VerifyFileAndStateAfterDoStopWithLogBytes(); | |
| 329 } | |
| 330 | |
| 331 TEST_F(NetLogFileWriterTest, DoStartClearsFile) { | |
| 332 // Verify file sizes after two consecutive starts/stops are the same (even if | |
| 333 // we add some junk data in between). | |
| 334 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | |
| 335 VerifyFileAndStateAfterDoStart(); | |
| 336 | |
| 337 int64_t start_file_size; | |
| 338 EXPECT_TRUE(base::GetFileSize(net_export_log_, &start_file_size)); | |
| 339 | |
| 340 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | |
| 341 VerifyFileAndStateAfterDoStop(); | |
| 342 | 394 |
| 343 int64_t stop_file_size; | 395 int64_t stop_file_size; |
| 344 EXPECT_TRUE(base::GetFileSize(net_export_log_, &stop_file_size)); | 396 EXPECT_TRUE(base::GetFileSize(default_log_path_, &stop_file_size)); |
| 345 EXPECT_GE(stop_file_size, start_file_size); | |
| 346 | 397 |
| 347 // Add some junk at the end of the file. | 398 // Add some junk at the end of the file. |
| 348 std::string junk_data("Hello"); | 399 std::string junk_data("Hello"); |
| 400 EXPECT_TRUE(base::AppendToFile(default_log_path_, junk_data.c_str(), |
| 401 junk_data.size())); |
| 402 |
| 403 int64_t junk_file_size; |
| 404 EXPECT_TRUE(base::GetFileSize(default_log_path_, &junk_file_size)); |
| 405 EXPECT_GT(junk_file_size, stop_file_size); |
| 406 |
| 407 // Start and stop again and make sure the file is back to the size it was |
| 408 // before adding the junk data. |
| 409 StartThenVerifyState(base::FilePath(), net::NetLogCaptureMode::Default(), |
| 410 kCaptureModeDefaultString); |
| 411 |
| 412 StopThenVerifyStateAndFile(base::FilePath(), nullptr, nullptr, |
| 413 kCaptureModeDefaultString); |
| 414 |
| 415 int64_t new_stop_file_size; |
| 416 EXPECT_TRUE(base::GetFileSize(default_log_path_, &new_stop_file_size)); |
| 417 |
| 418 EXPECT_EQ(new_stop_file_size, stop_file_size); |
| 419 } |
| 420 |
| 421 // Adds an event to the log file, then checks that the file is larger than |
| 422 // the file created without that event. |
| 423 TEST_F(NetLogFileWriterTest, AddEvent) { |
| 424 StartThenVerifyState(base::FilePath(), net::NetLogCaptureMode::Default(), |
| 425 kCaptureModeDefaultString); |
| 426 |
| 427 StopThenVerifyStateAndFile(base::FilePath(), nullptr, nullptr, |
| 428 kCaptureModeDefaultString); |
| 429 |
| 430 // Get file size without the event. |
| 431 int64_t stop_file_size; |
| 432 EXPECT_TRUE(base::GetFileSize(default_log_path_, &stop_file_size)); |
| 433 |
| 434 StartThenVerifyState(base::FilePath(), net::NetLogCaptureMode::Default(), |
| 435 kCaptureModeDefaultString); |
| 436 |
| 437 net_log_.AddGlobalEntry(net::NetLogEventType::CANCELLED); |
| 438 |
| 439 StopThenVerifyStateAndFile(base::FilePath(), nullptr, nullptr, |
| 440 kCaptureModeDefaultString); |
| 441 |
| 442 int64_t new_stop_file_size; |
| 443 EXPECT_TRUE(base::GetFileSize(default_log_path_, &new_stop_file_size)); |
| 444 |
| 445 EXPECT_GE(new_stop_file_size, stop_file_size); |
| 446 } |
| 447 |
| 448 // Using a custom path to make sure logging can still occur when |
| 449 // the path has changed. |
| 450 TEST_F(NetLogFileWriterTest, AddEventCustomPath) { |
| 451 base::FilePath::CharType kCustomRelativePath[] = |
| 452 FILE_PATH_LITERAL("custom/custom/chrome-net-export-log.json"); |
| 453 base::FilePath custom_log_path = |
| 454 log_temp_dir_.GetPath().Append(kCustomRelativePath); |
| 349 EXPECT_TRUE( | 455 EXPECT_TRUE( |
| 350 base::AppendToFile(net_export_log_, junk_data.c_str(), junk_data.size())); | 456 base::CreateDirectoryAndGetError(custom_log_path.DirName(), nullptr)); |
| 351 | 457 |
| 352 int64_t junk_file_size; | 458 StartThenVerifyState(custom_log_path, net::NetLogCaptureMode::Default(), |
| 353 EXPECT_TRUE(base::GetFileSize(net_export_log_, &junk_file_size)); | 459 kCaptureModeDefaultString); |
| 354 EXPECT_GT(junk_file_size, stop_file_size); | 460 |
| 355 | 461 StopThenVerifyStateAndFile(custom_log_path, nullptr, nullptr, |
| 356 // Execute DO_START/DO_STOP commands and make sure the file is back to the | 462 kCaptureModeDefaultString); |
| 357 // size before addition of junk data. | 463 |
| 358 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | 464 // Get file size without the event. |
| 359 VerifyFileAndStateAfterDoStart(); | 465 int64_t stop_file_size; |
| 360 | 466 EXPECT_TRUE(base::GetFileSize(custom_log_path, &stop_file_size)); |
| 361 int64_t new_start_file_size; | 467 |
| 362 EXPECT_TRUE(base::GetFileSize(net_export_log_, &new_start_file_size)); | 468 StartThenVerifyState(custom_log_path, net::NetLogCaptureMode::Default(), |
| 363 EXPECT_EQ(new_start_file_size, start_file_size); | 469 kCaptureModeDefaultString); |
| 364 | 470 |
| 365 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | 471 net_log_.AddGlobalEntry(net::NetLogEventType::CANCELLED); |
| 366 VerifyFileAndStateAfterDoStop(); | 472 |
| 473 StopThenVerifyStateAndFile(custom_log_path, nullptr, nullptr, |
| 474 kCaptureModeDefaultString); |
| 367 | 475 |
| 368 int64_t new_stop_file_size; | 476 int64_t new_stop_file_size; |
| 369 EXPECT_TRUE(base::GetFileSize(net_export_log_, &new_stop_file_size)); | 477 EXPECT_TRUE(base::GetFileSize(custom_log_path, &new_stop_file_size)); |
| 370 EXPECT_EQ(new_stop_file_size, stop_file_size); | |
| 371 } | |
| 372 | |
| 373 TEST_F(NetLogFileWriterTest, CheckAddEvent) { | |
| 374 // Add an event to |net_log_| and then test to make sure that, after we stop | |
| 375 // logging, the file is larger than the file created without that event. | |
| 376 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | |
| 377 VerifyFileAndStateAfterDoStart(); | |
| 378 | |
| 379 // Get file size without the event. | |
| 380 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | |
| 381 VerifyFileAndStateAfterDoStop(); | |
| 382 | |
| 383 int64_t stop_file_size; | |
| 384 EXPECT_TRUE(base::GetFileSize(net_export_log_, &stop_file_size)); | |
| 385 | |
| 386 // Perform DO_START and add an Event and then DO_STOP and then compare | |
| 387 // file sizes. | |
| 388 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | |
| 389 VerifyFileAndStateAfterDoStart(); | |
| 390 | |
| 391 // Log an event. | |
| 392 net_log_->AddGlobalEntry(net::NetLogEventType::CANCELLED); | |
| 393 | |
| 394 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | |
| 395 VerifyFileAndStateAfterDoStop(); | |
| 396 | |
| 397 int64_t new_stop_file_size; | |
| 398 EXPECT_TRUE(base::GetFileSize(net_export_log_, &new_stop_file_size)); | |
| 399 EXPECT_GE(new_stop_file_size, stop_file_size); | 478 EXPECT_GE(new_stop_file_size, stop_file_size); |
| 400 } | 479 } |
| 401 | 480 |
| 402 TEST_F(NetLogFileWriterTest, CheckAddEventWithCustomPath) { | 481 TEST_F(NetLogFileWriterTest, StopWithPolledDataAndContextGetter) { |
| 403 // Using a custom path to make sure logging can still occur when | 482 // Create dummy polled data |
| 404 // the path has changed. | 483 const char kDummyPolledDataPath[] = "dummy_path"; |
| 405 base::FilePath path; | 484 const char kDummyPolledDataString[] = "dummy_info"; |
| 406 net_log_file_writer_->GetNetExportLogBaseDirectory(&path); | 485 std::unique_ptr<base::DictionaryValue> dummy_polled_data = |
| 407 | 486 base::MakeUnique<base::DictionaryValue>(); |
| 408 base::FilePath::CharType kCustomPath[] = | 487 dummy_polled_data->SetString(kDummyPolledDataPath, kDummyPolledDataString); |
| 409 FILE_PATH_LITERAL("custom/custom/chrome-net-export-log.json"); | 488 |
| 410 base::FilePath custom_path = path.Append(kCustomPath); | 489 // Create test context getter on |net_thread_| and wait for it to finish. |
| 411 | 490 scoped_refptr<net::TestURLRequestContextGetter> context_getter; |
| 412 EXPECT_TRUE(base::CreateDirectoryAndGetError(custom_path.DirName(), nullptr)); | 491 const int kDummyQuicParam = 75; |
| 413 | 492 |
| 414 net_log_file_writer_->SetUpNetExportLogPath(custom_path); | 493 net::TestClosure init_done; |
| 415 net_export_log_ = net_log_file_writer_->log_path_; | 494 net_thread_.task_runner()->PostTaskAndReply( |
| 416 EXPECT_EQ(custom_path, net_export_log_); | 495 FROM_HERE, base::Bind(&SetUpTestContextGetterWithQuicTimeoutInfo, |
| 417 | 496 &net_log_, kDummyQuicParam, &context_getter), |
| 418 // Add an event to |net_log_| and then test to make sure that, after we stop | 497 init_done.closure()); |
| 419 // logging, the file is larger than the file created without that event. | 498 init_done.WaitForResult(); |
| 420 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | 499 |
| 421 VerifyFileAndStateAfterDoStart(); | 500 StartThenVerifyState(base::FilePath(), net::NetLogCaptureMode::Default(), |
| 422 | 501 kCaptureModeDefaultString); |
| 423 // Get file size without the event. | 502 |
| 424 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | 503 StopThenVerifyStateAndFile(base::FilePath(), std::move(dummy_polled_data), |
| 425 VerifyFileAndStateAfterDoStop(); | 504 context_getter, kCaptureModeDefaultString); |
| 426 | 505 |
| 427 int64_t stop_file_size; | 506 // Read polledData from log file. |
| 428 EXPECT_TRUE(base::GetFileSize(net_export_log_, &stop_file_size)); | 507 std::unique_ptr<base::DictionaryValue> root; |
| 429 | 508 ASSERT_TRUE(ReadCompleteLogFile(default_log_path_, &root)); |
| 430 // Perform DO_START and add an Event and then DO_STOP and then compare | 509 base::DictionaryValue* polled_data; |
| 431 // file sizes. | 510 ASSERT_TRUE(root->GetDictionary("polledData", &polled_data)); |
| 432 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_START); | 511 |
| 433 VerifyFileAndStateAfterDoStart(); | 512 // Check that it contains the field from the polled data that was passed in. |
| 434 | 513 std::string dummy_string; |
| 435 // Log an event. | 514 ASSERT_TRUE(polled_data->GetString(kDummyPolledDataPath, &dummy_string)); |
| 436 net_log_->AddGlobalEntry(net::NetLogEventType::CANCELLED); | 515 EXPECT_EQ(dummy_string, kDummyPolledDataString); |
| 437 | 516 |
| 438 net_log_file_writer_->ProcessCommand(NetLogFileWriter::DO_STOP); | 517 // Check that it also contains the field from the URLRequestContext that was |
| 439 VerifyFileAndStateAfterDoStop(); | 518 // passed in. |
| 440 | 519 base::DictionaryValue* quic_info; |
| 441 int64_t new_stop_file_size; | 520 ASSERT_TRUE(polled_data->GetDictionary("quicInfo", &quic_info)); |
| 442 EXPECT_TRUE(base::GetFileSize(net_export_log_, &new_stop_file_size)); | 521 base::Value* timeout_value = nullptr; |
| 443 EXPECT_GE(new_stop_file_size, stop_file_size); | 522 int timeout; |
| 523 ASSERT_TRUE( |
| 524 quic_info->Get("idle_connection_timeout_seconds", &timeout_value)); |
| 525 ASSERT_TRUE(timeout_value->GetAsInteger(&timeout)); |
| 526 EXPECT_EQ(timeout, kDummyQuicParam); |
| 527 } |
| 528 |
| 529 TEST_F(NetLogFileWriterTest, ReceiveStartWhileInitializing) { |
| 530 // Trigger initialization of |net_log_file_writer_|. |
| 531 TestStateCallback init_callback; |
| 532 net_log_file_writer_.GetState(init_callback.callback()); |
| 533 |
| 534 // Before running the main message loop, tell |net_log_file_writer_| to start |
| 535 // logging. Not running the main message loop prevents the initialization |
| 536 // process from completing, so this ensures that StartNetLog() is received |
| 537 // before |net_log_file_writer_| finishes initialization, which means this |
| 538 // should be a no-op. |
| 539 TestStateCallback start_during_init_callback; |
| 540 net_log_file_writer_.StartNetLog(base::FilePath(), |
| 541 net::NetLogCaptureMode::Default(), |
| 542 start_during_init_callback.callback()); |
| 543 |
| 544 // Now run the main message loop. |
| 545 std::unique_ptr<base::DictionaryValue> init_callback_state = |
| 546 init_callback.WaitForResult(); |
| 547 |
| 548 // The state returned by the GetState() call should be the state after |
| 549 // initialization, which should indicate not-logging. |
| 550 VerifyState(*init_callback_state, kStateNotLoggingString, false, false, ""); |
| 551 |
| 552 // The state returned by the ignored StartNetLog() call should also be the |
| 553 // state after the ongoing initialization finishes, so it should be identical |
| 554 // to the state returned by GetState(). |
| 555 std::unique_ptr<base::DictionaryValue> start_during_init_callback_state = |
| 556 start_during_init_callback.WaitForResult(); |
| 557 VerifyState(*start_during_init_callback_state, kStateNotLoggingString, false, |
| 558 false, ""); |
| 559 |
| 560 // Run an additional GetState() just to make sure |net_log_file_writer_| is |
| 561 // not logging. |
| 562 VerifyState(*FileWriterGetState(), kStateNotLoggingString, false, false, ""); |
| 563 } |
| 564 |
| 565 TEST_F(NetLogFileWriterTest, ReceiveStartWhileStoppingLog) { |
| 566 // Call StartNetLog() on |net_log_file_writer_| and wait for it to run its |
| 567 // state callback. |
| 568 StartThenVerifyState(base::FilePath(), |
| 569 net::NetLogCaptureMode::IncludeSocketBytes(), |
| 570 kCaptureModeIncludeSocketBytesString); |
| 571 |
| 572 // Tell |net_log_file_writer_| to stop logging. |
| 573 TestStateCallback stop_callback; |
| 574 net_log_file_writer_.StopNetLog(nullptr, nullptr, stop_callback.callback()); |
| 575 |
| 576 // Before running the main message loop, tell |net_log_file_writer_| to start |
| 577 // logging. Not running the main message loop prevents the stopping process |
| 578 // from completing, so this ensures StartNetLog() is received before |
| 579 // |net_log_file_writer_| finishes stopping, which means this should be a |
| 580 // no-op. |
| 581 TestStateCallback start_during_stop_callback; |
| 582 net_log_file_writer_.StartNetLog(base::FilePath(), |
| 583 net::NetLogCaptureMode::Default(), |
| 584 start_during_stop_callback.callback()); |
| 585 |
| 586 // Now run the main message loop. Since StartNetLog() will be a no-op, it will |
| 587 // simply run the state callback. There are no guarantees for when this state |
| 588 // callback will execute if StartNetLog() is called during the stopping |
| 589 // process, so the state it returns could either be stopping-log or |
| 590 // not-logging. For simplicity, the returned state will not be verified. |
| 591 start_during_stop_callback.WaitForResult(); |
| 592 |
| 593 // The state returned by the StopNetLog() call should be the state after |
| 594 // stopping, which should indicate not-logging. Also, the capture mode should |
| 595 // be the same as the one passed to the first StartNetLog() call, not the |
| 596 // second (ignored) one. |
| 597 std::unique_ptr<base::DictionaryValue> stop_callback_state = |
| 598 stop_callback.WaitForResult(); |
| 599 VerifyState(*stop_callback_state, kStateNotLoggingString, true, true, |
| 600 kCaptureModeIncludeSocketBytesString); |
| 601 |
| 602 // Run an additional GetState() just to make sure |net_log_file_writer_| is |
| 603 // not logging. |
| 604 VerifyState(*FileWriterGetState(), kStateNotLoggingString, true, true, |
| 605 kCaptureModeIncludeSocketBytesString); |
| 444 } | 606 } |
| 445 | 607 |
| 446 } // namespace net_log | 608 } // namespace net_log |
| OLD | NEW |