Index: ios/web/web_state/http_auth_inttest.mm |
diff --git a/ios/web/web_state/http_auth_inttest.mm b/ios/web/web_state/http_auth_inttest.mm |
new file mode 100644 |
index 0000000000000000000000000000000000000000..348460b628d7021b46656a10c5a3524f884fdc58 |
--- /dev/null |
+++ b/ios/web/web_state/http_auth_inttest.mm |
@@ -0,0 +1,121 @@ |
+// Copyright 2017 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "base/memory/ptr_util.h" |
+#include "base/strings/sys_string_conversions.h" |
+#include "base/test/ios/wait_util.h" |
+#import "ios/web/public/navigation_manager.h" |
+#import "ios/web/public/test/http_server.h" |
+#include "ios/web/public/test/http_server_util.h" |
+#import "ios/web/public/test/response_providers/http_auth_response_provider.h" |
+#import "ios/web/test/web_int_test.h" |
+#import "testing/gtest_mac.h" |
+#include "url/gurl.h" |
+ |
+namespace web { |
+ |
+using test::HttpServer; |
+ |
+// Test fixture for WebStateDelegate::OnAuthRequired integration tests. |
+class HttpAuthTest : public WebIntTest { |
+ protected: |
+ // Waits until WebStateDelegate::OnAuthRequired callback is called. |
+ void WaitForOnAuthRequiredCallback() { |
+ web_state_delegate_.ClearLastAuthenticationRequest(); |
+ base::test::ios::WaitUntilCondition(^bool { |
+ return web_state_delegate_.last_authentication_request(); |
+ }); |
+ } |
+ |
+ // Loads a page with URL and waits for OnAuthRequired callback. |
+ void LoadUrlWithAuthChallenge(const GURL& url) { |
+ NavigationManager::WebLoadParams params(url); |
+ navigation_manager()->LoadURLWithParams(params); |
+ WaitForOnAuthRequiredCallback(); |
+ } |
+ |
+ // Authenticates and waits until the page finishes loading. |
+ void Authenticate(NSString* username, NSString* password) { |
+ ASSERT_TRUE(web_state()->IsLoading()); |
+ auto auth_request = web_state_delegate_.last_authentication_request(); |
+ auth_request->auth_callback.Run(username, password); |
+ base::test::ios::WaitUntilCondition(^bool { |
+ return !web_state()->IsLoading(); |
+ }); |
+ } |
+}; |
+ |
+// Tests successful basic authentication. |
+TEST_F(HttpAuthTest, SuccessfullBasicAuth) { |
+ // Load the page which requests basic HTTP authentication. |
+ GURL url = HttpServer::MakeUrl("http://good-auth"); |
+ test::SetUpHttpServer(base::MakeUnique<HttpAuthResponseProvider>( |
+ url, "GoodRealm", "gooduser", "goodpass")); |
+ LoadUrlWithAuthChallenge(url); |
+ |
+ // Verify that callback receives correct WebState. |
+ auto auth_request = web_state_delegate_.last_authentication_request(); |
+ EXPECT_EQ(web_state(), auth_request->web_state); |
+ |
+ // Verify that callback receives correctly configured protection space. |
+ NSURLProtectionSpace* protection_space = auth_request->protection_space; |
+ EXPECT_NSEQ(@"GoodRealm", protection_space.realm); |
+ EXPECT_FALSE(protection_space.receivesCredentialSecurely); |
+ EXPECT_FALSE([protection_space isProxy]); |
+ EXPECT_EQ(url.host(), base::SysNSStringToUTF8(protection_space.host)); |
+ EXPECT_EQ( |
+ base::checked_cast<uint16_t>(HttpServer::GetSharedInstance().GetPort()), |
+ base::checked_cast<uint16_t>(protection_space.port)); |
+ EXPECT_FALSE(protection_space.proxyType); |
+ EXPECT_NSEQ(NSURLProtectionSpaceHTTP, protection_space.protocol); |
+ EXPECT_NSEQ(NSURLAuthenticationMethodHTTPBasic, |
+ protection_space.authenticationMethod); |
+ |
+ // Make sure that authenticated page renders expected text. |
+ Authenticate(@"gooduser", @"goodpass"); |
+ id document_body = ExecuteJavaScript(@"document.body.innerHTML"); |
+ EXPECT_EQ(HttpAuthResponseProvider::page_text(), |
+ base::SysNSStringToUTF8(document_body)); |
+} |
+ |
+// Tests unsuccessful basic authentication. |
+TEST_F(HttpAuthTest, UnsucessfulBasicAuth) { |
+ // Load the page which requests basic HTTP authentication. |
+ GURL url = HttpServer::MakeUrl("http://bad-auth"); |
+ test::SetUpHttpServer(base::MakeUnique<HttpAuthResponseProvider>( |
+ url, "BadRealm", "baduser", "badpass")); |
+ LoadUrlWithAuthChallenge(url); |
+ |
+ // Make sure that incorrect credentials request authentication again. |
+ auto auth_request = web_state_delegate_.last_authentication_request(); |
+ auth_request->auth_callback.Run(@"gooduser", @"goodpass"); |
+ WaitForOnAuthRequiredCallback(); |
+ |
+ // Verify that callback receives correct WebState. |
+ auth_request = web_state_delegate_.last_authentication_request(); |
+ EXPECT_EQ(web_state(), auth_request->web_state); |
+ |
+ // Verify that callback receives correctly configured protection space. |
+ NSURLProtectionSpace* protection_space = auth_request->protection_space; |
+ EXPECT_NSEQ(@"BadRealm", protection_space.realm); |
+ EXPECT_FALSE(protection_space.receivesCredentialSecurely); |
+ EXPECT_FALSE([protection_space isProxy]); |
+ EXPECT_EQ(url.host(), base::SysNSStringToUTF8(protection_space.host)); |
+ EXPECT_EQ( |
+ base::checked_cast<uint16_t>(HttpServer::GetSharedInstance().GetPort()), |
+ base::checked_cast<uint16_t>(protection_space.port)); |
+ EXPECT_FALSE(protection_space.proxyType); |
+ EXPECT_NSEQ(NSURLProtectionSpaceHTTP, protection_space.protocol); |
+ EXPECT_NSEQ(NSURLAuthenticationMethodHTTPBasic, |
+ protection_space.authenticationMethod); |
+ |
+ // Cancel authentication and make sure that the page is blank. |
+ auth_request->auth_callback.Run(nil, nil); |
+ base::test::ios::WaitUntilCondition(^bool { |
+ return !web_state()->IsLoading(); |
+ }); |
+ EXPECT_FALSE(ExecuteJavaScript(@"window.document")); |
+} |
+ |
+} // web |