Index: chrome/browser/extensions/api/web_request/web_request_api_unittest.cc |
diff --git a/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc b/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc |
index 0126832d8687e9d932b18af53a1598307e3be756..c74a5711c5c1e8212fffd7800a175f5800d6c1ef 100644 |
--- a/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc |
+++ b/chrome/browser/extensions/api/web_request/web_request_api_unittest.cc |
@@ -1776,15 +1776,18 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnBeforeSendHeadersResponses) { |
linked_ptr<EventResponseDelta> d0( |
new EventResponseDelta("extid0", base::Time::FromInternalValue(2500))); |
deltas.push_back(d0); |
+ bool request_headers_modified0; |
net::HttpRequestHeaders headers0; |
headers0.MergeFrom(base_headers); |
- MergeOnBeforeSendHeadersResponses(deltas, &headers0, &warning_set, &net_log); |
+ MergeOnBeforeSendHeadersResponses(deltas, &headers0, &warning_set, &net_log, |
+ &request_headers_modified0); |
ASSERT_TRUE(headers0.GetHeader("key1", &header_value)); |
EXPECT_EQ("value 1", header_value); |
ASSERT_TRUE(headers0.GetHeader("key2", &header_value)); |
EXPECT_EQ("value 2", header_value); |
EXPECT_EQ(0u, warning_set.size()); |
EXPECT_EQ(0u, capturing_net_log.GetSize()); |
+ EXPECT_FALSE(request_headers_modified0); |
// Delete, modify and add a header. |
linked_ptr<EventResponseDelta> d1( |
@@ -1796,9 +1799,11 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnBeforeSendHeadersResponses) { |
deltas.sort(&InDecreasingExtensionInstallationTimeOrder); |
warning_set.clear(); |
capturing_net_log.Clear(); |
+ bool request_headers_modified1; |
net::HttpRequestHeaders headers1; |
headers1.MergeFrom(base_headers); |
- MergeOnBeforeSendHeadersResponses(deltas, &headers1, &warning_set, &net_log); |
+ MergeOnBeforeSendHeadersResponses(deltas, &headers1, &warning_set, &net_log, |
+ &request_headers_modified1); |
EXPECT_FALSE(headers1.HasHeader("key1")); |
ASSERT_TRUE(headers1.GetHeader("key2", &header_value)); |
EXPECT_EQ("value 3", header_value); |
@@ -1806,6 +1811,7 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnBeforeSendHeadersResponses) { |
EXPECT_EQ("value 3", header_value); |
EXPECT_EQ(0u, warning_set.size()); |
EXPECT_EQ(1u, capturing_net_log.GetSize()); |
+ EXPECT_TRUE(request_headers_modified1); |
// Check that conflicts are atomic, i.e. if one header modification |
// collides all other conflicts of the same extension are declined as well. |
@@ -1818,9 +1824,11 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnBeforeSendHeadersResponses) { |
deltas.sort(&InDecreasingExtensionInstallationTimeOrder); |
warning_set.clear(); |
capturing_net_log.Clear(); |
+ bool request_headers_modified2; |
net::HttpRequestHeaders headers2; |
headers2.MergeFrom(base_headers); |
- MergeOnBeforeSendHeadersResponses(deltas, &headers2, &warning_set, &net_log); |
+ MergeOnBeforeSendHeadersResponses(deltas, &headers2, &warning_set, &net_log, |
+ &request_headers_modified2); |
EXPECT_FALSE(headers2.HasHeader("key1")); |
ASSERT_TRUE(headers2.GetHeader("key2", &header_value)); |
EXPECT_EQ("value 3", header_value); |
@@ -1830,6 +1838,7 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnBeforeSendHeadersResponses) { |
EXPECT_EQ(1u, warning_set.size()); |
EXPECT_TRUE(HasWarning(warning_set, "extid2")); |
EXPECT_EQ(2u, capturing_net_log.GetSize()); |
+ EXPECT_TRUE(request_headers_modified2); |
// Check that identical modifications don't conflict and operations |
// can be merged. |
@@ -1842,9 +1851,11 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnBeforeSendHeadersResponses) { |
deltas.sort(&InDecreasingExtensionInstallationTimeOrder); |
warning_set.clear(); |
capturing_net_log.Clear(); |
+ bool request_headers_modified3; |
net::HttpRequestHeaders headers3; |
headers3.MergeFrom(base_headers); |
- MergeOnBeforeSendHeadersResponses(deltas, &headers3, &warning_set, &net_log); |
+ MergeOnBeforeSendHeadersResponses(deltas, &headers3, &warning_set, &net_log, |
+ &request_headers_modified3); |
EXPECT_FALSE(headers3.HasHeader("key1")); |
ASSERT_TRUE(headers3.GetHeader("key2", &header_value)); |
EXPECT_EQ("value 3", header_value); |
@@ -1855,6 +1866,7 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnBeforeSendHeadersResponses) { |
EXPECT_EQ(1u, warning_set.size()); |
EXPECT_TRUE(HasWarning(warning_set, "extid2")); |
EXPECT_EQ(3u, capturing_net_log.GetSize()); |
+ EXPECT_TRUE(request_headers_modified3); |
} |
TEST(ExtensionWebRequestHelpersTest, |
@@ -1907,15 +1919,18 @@ TEST(ExtensionWebRequestHelpersTest, |
deltas.push_back(delta); |
} |
deltas.sort(&InDecreasingExtensionInstallationTimeOrder); |
+ bool request_headers_modified1; |
net::HttpRequestHeaders headers1; |
headers1.MergeFrom(base_headers); |
warning_set.clear(); |
- MergeOnBeforeSendHeadersResponses(deltas, &headers1, &warning_set, &net_log); |
+ MergeOnBeforeSendHeadersResponses(deltas, &headers1, &warning_set, &net_log, |
+ &request_headers_modified1); |
EXPECT_TRUE(headers1.HasHeader("Cookie")); |
ASSERT_TRUE(headers1.GetHeader("Cookie", &header_value)); |
EXPECT_EQ("name=new value; name2=new value; name4=\"value 4\"", header_value); |
EXPECT_EQ(0u, warning_set.size()); |
EXPECT_EQ(0u, capturing_net_log.GetSize()); |
+ EXPECT_FALSE(request_headers_modified1); |
} |
namespace { |
@@ -2201,15 +2216,18 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnHeadersReceivedResponses) { |
linked_ptr<EventResponseDelta> d0( |
new EventResponseDelta("extid0", base::Time::FromInternalValue(3000))); |
deltas.push_back(d0); |
+ bool response_headers_modified0; |
scoped_refptr<net::HttpResponseHeaders> new_headers0; |
GURL allowed_unsafe_redirect_url0; |
MergeOnHeadersReceivedResponses(GURL(kExampleUrl), deltas, base_headers.get(), |
&new_headers0, &allowed_unsafe_redirect_url0, |
- &warning_set, &net_log); |
+ &warning_set, &net_log, |
+ &response_headers_modified0); |
EXPECT_FALSE(new_headers0.get()); |
EXPECT_TRUE(allowed_unsafe_redirect_url0.is_empty()); |
EXPECT_EQ(0u, warning_set.size()); |
EXPECT_EQ(0u, capturing_net_log.GetSize()); |
+ EXPECT_FALSE(response_headers_modified0); |
linked_ptr<EventResponseDelta> d1( |
new EventResponseDelta("extid1", base::Time::FromInternalValue(2000))); |
@@ -2220,11 +2238,13 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnHeadersReceivedResponses) { |
deltas.sort(&InDecreasingExtensionInstallationTimeOrder); |
warning_set.clear(); |
capturing_net_log.Clear(); |
+ bool response_headers_modified1; |
scoped_refptr<net::HttpResponseHeaders> new_headers1; |
GURL allowed_unsafe_redirect_url1; |
MergeOnHeadersReceivedResponses(GURL(kExampleUrl), deltas, base_headers.get(), |
&new_headers1, &allowed_unsafe_redirect_url1, |
- &warning_set, &net_log); |
+ &warning_set, &net_log, |
+ &response_headers_modified1); |
ASSERT_TRUE(new_headers1.get()); |
EXPECT_TRUE(allowed_unsafe_redirect_url1.is_empty()); |
std::multimap<std::string, std::string> expected1; |
@@ -2239,6 +2259,7 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnHeadersReceivedResponses) { |
EXPECT_EQ(expected1, actual1); |
EXPECT_EQ(0u, warning_set.size()); |
EXPECT_EQ(1u, capturing_net_log.GetSize()); |
+ EXPECT_TRUE(response_headers_modified1); |
// Check that we replace response headers only once. |
linked_ptr<EventResponseDelta> d2( |
@@ -2251,11 +2272,13 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnHeadersReceivedResponses) { |
deltas.sort(&InDecreasingExtensionInstallationTimeOrder); |
warning_set.clear(); |
capturing_net_log.Clear(); |
+ bool response_headers_modified2; |
scoped_refptr<net::HttpResponseHeaders> new_headers2; |
GURL allowed_unsafe_redirect_url2; |
MergeOnHeadersReceivedResponses(GURL(kExampleUrl), deltas, base_headers.get(), |
&new_headers2, &allowed_unsafe_redirect_url2, |
- &warning_set, &net_log); |
+ &warning_set, &net_log, |
+ &response_headers_modified2); |
ASSERT_TRUE(new_headers2.get()); |
EXPECT_TRUE(allowed_unsafe_redirect_url2.is_empty()); |
iter = 0; |
@@ -2267,6 +2290,7 @@ TEST(ExtensionWebRequestHelpersTest, TestMergeOnHeadersReceivedResponses) { |
EXPECT_EQ(1u, warning_set.size()); |
EXPECT_TRUE(HasWarning(warning_set, "extid2")); |
EXPECT_EQ(2u, capturing_net_log.GetSize()); |
+ EXPECT_TRUE(response_headers_modified2); |
} |
// Check that we do not delete too much |
@@ -2294,11 +2318,13 @@ TEST(ExtensionWebRequestHelpersTest, |
new EventResponseDelta("extid1", base::Time::FromInternalValue(2000))); |
d1->deleted_response_headers.push_back(ResponseHeader("KEY1", "Value2")); |
deltas.push_back(d1); |
+ bool response_headers_modified1; |
scoped_refptr<net::HttpResponseHeaders> new_headers1; |
GURL allowed_unsafe_redirect_url1; |
MergeOnHeadersReceivedResponses(GURL(kExampleUrl), deltas, base_headers.get(), |
&new_headers1, &allowed_unsafe_redirect_url1, |
- &warning_set, &net_log); |
+ &warning_set, &net_log, |
+ &response_headers_modified1); |
ASSERT_TRUE(new_headers1.get()); |
EXPECT_TRUE(allowed_unsafe_redirect_url1.is_empty()); |
std::multimap<std::string, std::string> expected1; |
@@ -2315,6 +2341,7 @@ TEST(ExtensionWebRequestHelpersTest, |
EXPECT_EQ(expected1, actual1); |
EXPECT_EQ(0u, warning_set.size()); |
EXPECT_EQ(1u, capturing_net_log.GetSize()); |
+ EXPECT_TRUE(response_headers_modified1); |
} |
// Tests whether onHeadersReceived can initiate a redirect. |
@@ -2338,15 +2365,18 @@ TEST(ExtensionWebRequestHelpersTest, |
linked_ptr<EventResponseDelta> d0( |
new EventResponseDelta("extid0", base::Time::FromInternalValue(0))); |
deltas.push_back(d0); |
+ bool response_headers_modified0; |
scoped_refptr<net::HttpResponseHeaders> new_headers0; |
GURL allowed_unsafe_redirect_url0; |
MergeOnHeadersReceivedResponses(GURL(kExampleUrl), deltas, base_headers.get(), |
&new_headers0, &allowed_unsafe_redirect_url0, |
- &warning_set, &net_log); |
+ &warning_set, &net_log, |
+ &response_headers_modified0); |
EXPECT_FALSE(new_headers0.get()); |
EXPECT_TRUE(allowed_unsafe_redirect_url0.is_empty()); |
EXPECT_EQ(0u, warning_set.size()); |
EXPECT_EQ(0u, capturing_net_log.GetSize()); |
+ EXPECT_FALSE(response_headers_modified0); |
// Single redirect. |
GURL new_url_1("http://foo.com"); |
@@ -2356,17 +2386,20 @@ TEST(ExtensionWebRequestHelpersTest, |
deltas.push_back(d1); |
deltas.sort(&InDecreasingExtensionInstallationTimeOrder); |
capturing_net_log.Clear(); |
+ bool response_headers_modified1; |
scoped_refptr<net::HttpResponseHeaders> new_headers1; |
GURL allowed_unsafe_redirect_url1; |
MergeOnHeadersReceivedResponses(GURL(kExampleUrl), deltas, base_headers.get(), |
&new_headers1, &allowed_unsafe_redirect_url1, |
- &warning_set, &net_log); |
+ &warning_set, &net_log, |
+ &response_headers_modified1); |
EXPECT_TRUE(new_headers1.get()); |
EXPECT_TRUE(new_headers1->HasHeaderValue("Location", new_url_1.spec())); |
EXPECT_EQ(new_url_1, allowed_unsafe_redirect_url1); |
EXPECT_TRUE(warning_set.empty()); |
EXPECT_EQ(1u, capturing_net_log.GetSize()); |
+ EXPECT_FALSE(response_headers_modified1); |
} |
TEST(ExtensionWebRequestHelpersTest, TestMergeOnAuthRequiredResponses) { |