Index: components/data_reduction_proxy/browser/data_reduction_proxy_settings_unittest.cc |
diff --git a/components/data_reduction_proxy/browser/data_reduction_proxy_settings_unittest.cc b/components/data_reduction_proxy/browser/data_reduction_proxy_settings_unittest.cc |
index 0dd2a6a8505ce40e334e0a160345b615e0cc6cf2..28548827409f0d54e7503500d8d601accf29ebea 100644 |
--- a/components/data_reduction_proxy/browser/data_reduction_proxy_settings_unittest.cc |
+++ b/components/data_reduction_proxy/browser/data_reduction_proxy_settings_unittest.cc |
@@ -20,14 +20,6 @@ |
namespace { |
-const char kDataReductionProxy[] = "https://foo.com:443/"; |
-const char kDataReductionProxyDev[] = "http://foo-dev.com:80"; |
-const char kDataReductionProxyFallback[] = "http://bar.com:80"; |
-const char kDataReductionProxyKey[] = "12345"; |
-const char kDataReductionProxyAlt[] = "https://alt.com:443/"; |
-const char kDataReductionProxyAltFallback[] = "http://alt2.com:80"; |
-const char kDataReductionProxySSL[] = "http://ssl.com:80"; |
- |
const char kProbeURLWithOKResponse[] = "http://ok.org/"; |
const char kProbeURLWithBadResponse[] = "http://bad.org/"; |
const char kProbeURLWithNoResponse[] = "http://no.org/"; |
@@ -42,84 +34,55 @@ class DataReductionProxySettingsTest |
DataReductionProxySettings> { |
}; |
- |
-TEST_F(DataReductionProxySettingsTest, TestAuthenticationInit) { |
- net::HttpAuthCache cache; |
- DataReductionProxyParams drp_params( |
- DataReductionProxyParams::kAllowed | |
- DataReductionProxyParams::kFallbackAllowed | |
- DataReductionProxyParams::kPromoAllowed); |
- drp_params.set_key(kDataReductionProxyKey); |
- DataReductionProxySettings::InitDataReductionAuthentication( |
- &cache, &drp_params); |
- DataReductionProxyParams::DataReductionProxyList proxies = |
- drp_params.GetAllowedProxies(); |
- for (DataReductionProxyParams::DataReductionProxyList::iterator it = |
- proxies.begin(); it != proxies.end(); ++it) { |
- net::HttpAuthCache::Entry* entry = cache.LookupByPath(*it, |
- std::string("/")); |
- EXPECT_TRUE(entry != NULL); |
- EXPECT_EQ(net::HttpAuth::AUTH_SCHEME_SPDYPROXY, entry->scheme()); |
- EXPECT_EQ("SpdyProxy", entry->auth_challenge().substr(0,9)); |
- } |
- GURL bad_server = GURL("https://bad.proxy.com/"); |
- net::HttpAuthCache::Entry* entry = |
- cache.LookupByPath(bad_server, std::string()); |
- EXPECT_TRUE(entry == NULL); |
-} |
- |
TEST_F(DataReductionProxySettingsTest, TestGetDataReductionProxyOrigin) { |
// SetUp() adds the origin to the command line, which should be returned here. |
std::string result = |
settings_->params()->origin().spec(); |
- EXPECT_EQ(GURL(kDataReductionProxy), GURL(result)); |
+ EXPECT_EQ(GURL(expected_params_->DefaultOrigin()), GURL(result)); |
} |
TEST_F(DataReductionProxySettingsTest, TestGetDataReductionProxyDevOrigin) { |
CommandLine::ForCurrentProcess()->AppendSwitchASCII( |
- switches::kDataReductionProxyDev, kDataReductionProxyDev); |
+ switches::kDataReductionProxyDev, expected_params_->DefaultDevOrigin()); |
ResetSettings(true, true, false, true); |
std::string result = |
settings_->params()->origin().spec(); |
- EXPECT_EQ(GURL(kDataReductionProxyDev), GURL(result)); |
+ EXPECT_EQ(GURL(expected_params_->DefaultDevOrigin()), GURL(result)); |
} |
TEST_F(DataReductionProxySettingsTest, TestGetDataReductionProxies) { |
- DataReductionProxyParams drp_params( |
- DataReductionProxyParams::kAllowed | |
- DataReductionProxyParams::kFallbackAllowed | |
- DataReductionProxyParams::kPromoAllowed); |
DataReductionProxyParams::DataReductionProxyList proxies = |
- drp_params.GetAllowedProxies(); |
+ expected_params_->GetAllowedProxies(); |
unsigned int expected_proxy_size = 2u; |
EXPECT_EQ(expected_proxy_size, proxies.size()); |
- // Command line proxies have precedence, so even if there were other values |
- // compiled in, these should be the ones in the list. |
- EXPECT_EQ("foo.com", proxies[0].host()); |
- EXPECT_EQ(443 ,proxies[0].EffectiveIntPort()); |
- EXPECT_EQ("bar.com", proxies[1].host()); |
- EXPECT_EQ(80, proxies[1].EffectiveIntPort()); |
-} |
- |
-TEST_F(DataReductionProxySettingsTest, TestAuthHashGeneration) { |
- std::string salt = "8675309"; // Jenny's number to test the hash generator. |
- std::string salted_key = salt + kDataReductionProxyKey + salt; |
- base::string16 expected_hash = base::UTF8ToUTF16(base::MD5String(salted_key)); |
- EXPECT_EQ(expected_hash, |
- DataReductionProxySettings::AuthHashForSalt( |
- 8675309, kDataReductionProxyKey)); |
+ net::HostPortPair expected_origin = |
+ net::HostPortPair::FromURL(GURL(expected_params_->DefaultOrigin())); |
+ net::HostPortPair expected_fallback_origin = |
+ net::HostPortPair::FromURL( |
+ GURL(expected_params_->DefaultFallbackOrigin())); |
+ EXPECT_EQ(expected_origin.host(), proxies[0].host()); |
+ EXPECT_EQ(expected_origin.port() ,proxies[0].EffectiveIntPort()); |
+ EXPECT_EQ(expected_fallback_origin.host(), proxies[1].host()); |
+ EXPECT_EQ(expected_fallback_origin.port(), proxies[1].EffectiveIntPort()); |
} |
TEST_F(DataReductionProxySettingsTest, TestSetProxyConfigs) { |
+ TestDataReductionProxyParams drp_params( |
+ DataReductionProxyParams::kAllowed | |
+ DataReductionProxyParams::kFallbackAllowed | |
+ DataReductionProxyParams::kPromoAllowed, |
+ TestDataReductionProxyParams::HAS_EVERYTHING & |
+ ~TestDataReductionProxyParams::HAS_DEV_ORIGIN); |
CommandLine::ForCurrentProcess()->AppendSwitchASCII( |
- switches::kDataReductionProxyAlt, kDataReductionProxyAlt); |
+ switches::kDataReductionProxyAlt, drp_params.DefaultAltOrigin()); |
CommandLine::ForCurrentProcess()->AppendSwitchASCII( |
- switches::kDataReductionProxyAltFallback, kDataReductionProxyAltFallback); |
+ switches::kDataReductionProxyAltFallback, |
+ drp_params.DefaultAltFallbackOrigin()); |
CommandLine::ForCurrentProcess()->AppendSwitchASCII( |
- switches::kDataReductionSSLProxy, kDataReductionProxySSL); |
+ switches::kDataReductionSSLProxy, drp_params.DefaultSSLOrigin()); |
ResetSettings(true, true, true, true); |
TestDataReductionProxyConfig* config = |
static_cast<TestDataReductionProxyConfig*>( |
@@ -127,20 +90,23 @@ TEST_F(DataReductionProxySettingsTest, TestSetProxyConfigs) { |
settings_->SetProxyConfigs(true, true, false, false); |
EXPECT_TRUE(config->enabled_); |
- EXPECT_TRUE(net::HostPortPair::FromString(kDataReductionProxyAlt).Equals( |
- net::HostPortPair::FromString(config->origin_))); |
- EXPECT_TRUE( |
- net::HostPortPair::FromString(kDataReductionProxyAltFallback).Equals( |
+ EXPECT_TRUE(net::HostPortPair::FromString( |
+ expected_params_->DefaultAltOrigin()).Equals( |
+ net::HostPortPair::FromString(config->origin_))); |
+ EXPECT_TRUE(net::HostPortPair::FromString( |
+ expected_params_->DefaultAltFallbackOrigin()).Equals( |
net::HostPortPair::FromString(config->fallback_origin_))); |
- EXPECT_TRUE(net::HostPortPair::FromString(kDataReductionProxySSL).Equals( |
- net::HostPortPair::FromString(config->ssl_origin_))); |
+ EXPECT_TRUE(net::HostPortPair::FromString( |
+ expected_params_->DefaultSSLOrigin()).Equals( |
+ net::HostPortPair::FromString(config->ssl_origin_))); |
settings_->SetProxyConfigs(true, false, false, false); |
EXPECT_TRUE(config->enabled_); |
- EXPECT_TRUE(net::HostPortPair::FromString(kDataReductionProxy).Equals( |
- net::HostPortPair::FromString(config->origin_))); |
- EXPECT_TRUE(net::HostPortPair::FromString(kDataReductionProxyFallback).Equals( |
- net::HostPortPair::FromString(config->fallback_origin_))); |
+ EXPECT_TRUE(net::HostPortPair::FromString(drp_params.DefaultOrigin()).Equals( |
+ net::HostPortPair::FromString(config->origin_))); |
+ EXPECT_TRUE(net::HostPortPair::FromString( |
+ drp_params.DefaultFallbackOrigin()).Equals( |
+ net::HostPortPair::FromString(config->fallback_origin_))); |
EXPECT_EQ("", config->ssl_origin_); |
settings_->SetProxyConfigs(false, true, false, false); |
@@ -177,61 +143,6 @@ TEST_F(DataReductionProxySettingsTest, TestIsProxyEnabledOrManaged) { |
base::MessageLoop::current()->RunUntilIdle(); |
} |
-TEST_F(DataReductionProxySettingsTest, TestAcceptableChallenges) { |
- typedef struct { |
- std::string host; |
- std::string realm; |
- bool expected_to_succeed; |
- } challenge_test; |
- |
- challenge_test tests[] = { |
- {"foo.com:443", "", false}, // 0. No realm. |
- {"foo.com:443", "xxx", false}, // 1. Wrong realm. |
- {"foo.com:443", "spdyproxy", false}, // 2. Case matters. |
- {"foo.com:443", "SpdyProxy", true}, // 3. OK. |
- {"foo.com:443", "SpdyProxy1234567", true}, // 4. OK |
- {"bar.com:80", "SpdyProxy1234567", true}, // 5. OK. |
- {"foo.com:443", "SpdyProxyxxx", true}, // 6. OK |
- {"", "SpdyProxy1234567", false}, // 7. No challenger. |
- {"xxx.net:443", "SpdyProxy1234567", false}, // 8. Wrong host. |
- {"foo.com", "SpdyProxy1234567", false}, // 9. No port. |
- {"foo.com:80", "SpdyProxy1234567", false}, // 10.Wrong port. |
- {"bar.com:81", "SpdyProxy1234567", false}, // 11.Wrong port. |
- }; |
- |
- for (int i = 0; i <= 11; ++i) { |
- scoped_refptr<net::AuthChallengeInfo> auth_info(new net::AuthChallengeInfo); |
- auth_info->challenger = net::HostPortPair::FromString(tests[i].host); |
- auth_info->realm = tests[i].realm; |
- EXPECT_EQ(tests[i].expected_to_succeed, |
- settings_->IsAcceptableAuthChallenge(auth_info.get())); |
- } |
-} |
- |
-TEST_F(DataReductionProxySettingsTest, TestChallengeTokens) { |
- typedef struct { |
- std::string realm; |
- bool expected_empty_token; |
- } token_test; |
- |
- token_test tests[] = { |
- {"", true}, // 0. No realm. |
- {"xxx", true}, // 1. realm too short. |
- {"spdyproxy", true}, // 2. no salt. |
- {"SpdyProxyxxx", true}, // 3. Salt not an int. |
- {"SpdyProxy1234567", false}, // 4. OK |
- }; |
- |
- for (int i = 0; i <= 4; ++i) { |
- scoped_refptr<net::AuthChallengeInfo> auth_info(new net::AuthChallengeInfo); |
- auth_info->challenger = |
- net::HostPortPair::FromString(kDataReductionProxy); |
- auth_info->realm = tests[i].realm; |
- base::string16 token = settings_->GetTokenForAuthChallenge(auth_info.get()); |
- EXPECT_EQ(tests[i].expected_empty_token, token.empty()); |
- } |
-} |
- |
TEST_F(DataReductionProxySettingsTest, TestResetDataReductionStatistics) { |
int64 original_content_length; |
int64 received_content_length; |
@@ -424,7 +335,7 @@ TEST_F(DataReductionProxySettingsTest, TestInitDataReductionProxyOff) { |
CheckInitDataReductionProxy(false); |
} |
-TEST_F(DataReductionProxySettingsTest, TestSetProxyFromCommandLine) { |
+TEST_F(DataReductionProxySettingsTest, TestEnableProxyFromCommandLine) { |
MockSettings* settings = static_cast<MockSettings*>(settings_.get()); |
EXPECT_CALL(*settings, RecordStartupState(PROXY_ENABLED)); |