Chromium Code Reviews| Index: net/base/layered_network_delegate_unittest.cc |
| diff --git a/net/base/layered_network_delegate_unittest.cc b/net/base/layered_network_delegate_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..a64799326010fdb89049c0b09b908dd669d9dbc7 |
| --- /dev/null |
| +++ b/net/base/layered_network_delegate_unittest.cc |
| @@ -0,0 +1,400 @@ |
| +// Copyright 2014 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "net/base/layered_network_delegate.h" |
| + |
| +#include "base/bind.h" |
| +#include "base/files/file_path.h" |
| +#include "base/memory/ref_counted.h" |
| +#include "base/memory/scoped_ptr.h" |
| +#include "net/base/auth.h" |
| +#include "net/base/net_errors.h" |
| +#include "net/base/network_delegate_impl.h" |
| +#include "net/base/request_priority.h" |
| +#include "net/base/test_completion_callback.h" |
| +#include "net/http/http_response_headers.h" |
| +#include "net/proxy/proxy_config_service.h" |
| +#include "net/proxy/proxy_info.h" |
| +#include "net/proxy/proxy_service.h" |
| +#include "net/url_request/url_request.h" |
| +#include "net/url_request/url_request_test_util.h" |
| +#include "testing/gmock/include/gmock/gmock.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| +#include "url/gurl.h" |
| + |
| +namespace net { |
| + |
| +typedef std::map<const char*, int> CountersMap; |
|
mmenke
2014/12/03 18:50:38
include map.
megjablon
2014/12/04 01:23:46
Done.
|
| + |
| +void VerifyCounters(CountersMap counters, int64 count) { |
|
mmenke
2014/12/03 18:50:38
int64 not needed
mmenke
2014/12/03 18:50:38
Actually, can you just get rid of this method, and
megjablon
2014/12/04 01:23:46
Done.
|
| + for (CountersMap::iterator iter = counters.begin(); |
| + iter != counters.end(); ++iter) { |
| + EXPECT_EQ(count, iter->second); |
| + } |
| +} |
| + |
| +class TestProxyConfigService : public ProxyConfigService { |
|
mmenke
2014/12/03 18:50:38
Not needed. Can just use ProxyService::CreateDire
megjablon
2014/12/04 01:23:46
Done.
|
| + public: |
| + TestProxyConfigService() { |
| + } |
| + |
| + void AddObserver(ProxyConfigService::Observer* observer) override { |
| + } |
| + |
| + void RemoveObserver(ProxyConfigService::Observer* observer) override { |
| + } |
| + |
| + ConfigAvailability GetLatestProxyConfig(ProxyConfig* config) override { |
| + return ProxyConfigService::CONFIG_VALID; |
| + } |
| +}; |
| + |
| +class TestNetworkDelegateImpl : public NetworkDelegateImpl { |
| + public: |
| + TestNetworkDelegateImpl() { |
| + } |
| + |
| + ~TestNetworkDelegateImpl() override { |
| + } |
| + |
| + void VerifyCalled(int64 count) { |
| + VerifyCounters(counters_, count); |
| + } |
| + |
| + private: |
| + int OnBeforeURLRequest(URLRequest* request, |
| + const CompletionCallback& callback, |
| + GURL* new_url) override { |
| + ++counters_["on_before_url_request_count"]; |
|
mmenke
2014/12/03 18:50:38
Hrm... It's a pain, but if we want to be complete
megjablon
2014/12/04 01:23:46
Done.
|
| + return OK; |
| + } |
| + |
| + void OnResolveProxy(const GURL& url, |
| + int load_flags, |
| + const ProxyService& proxy_service, |
| + ProxyInfo* result) override { |
| + ++counters_["on_resolve_proxy_count"]; |
| + } |
| + |
| + void OnProxyFallback(const ProxyServer& bad_proxy, int net_error) override { |
| + ++counters_["on_proxy_fallback_count"]; |
| + } |
| + |
| + int OnBeforeSendHeaders(URLRequest* request, |
| + const CompletionCallback& callback, |
| + HttpRequestHeaders* headers) override { |
| + ++counters_["on_before_send_headers_count"]; |
| + return OK; |
| + } |
| + |
| + void OnBeforeSendProxyHeaders(URLRequest* request, |
| + const ProxyInfo& proxy_info, |
| + HttpRequestHeaders* headers) override { |
| + ++counters_["on_before_send_proxy_headers_count"]; |
| + } |
| + |
| + void OnSendHeaders(URLRequest* request, |
| + const HttpRequestHeaders& headers) override { |
| + ++counters_["on_send_headers_count"]; |
| + } |
| + |
| + int OnHeadersReceived( |
| + URLRequest* request, |
| + const CompletionCallback& callback, |
| + const HttpResponseHeaders* original_response_headers, |
| + scoped_refptr<HttpResponseHeaders>* override_response_headers, |
| + GURL* allowed_unsafe_redirect_url) override { |
| + ++counters_["on_headers_received_count"]; |
| + return OK; |
| + } |
| + |
| + void OnBeforeRedirect(URLRequest* request, |
| + const GURL& new_location) override { |
| + ++counters_["on_before_redirect_count"]; |
| + } |
| + |
| + void OnResponseStarted(URLRequest* request) override { |
| + ++counters_["on_response_started_count"]; |
| + } |
| + |
| + void OnRawBytesRead(const URLRequest& request, int bytes_read) override { |
| + ++counters_["on_raw_bytes_read_count"]; |
| + } |
| + |
| + void OnCompleted(URLRequest* request, bool started) override { |
| + ++counters_["on_completed_count"]; |
| + } |
| + |
| + void OnURLRequestDestroyed(URLRequest* request) override { |
| + ++counters_["on_url_request_destroyed_count"]; |
| + } |
| + |
| + void OnPACScriptError(int line_number, |
| + const base::string16& error) override { |
| + ++counters_["on_pac_script_error_count"]; |
| + } |
| + |
| + AuthRequiredResponse OnAuthRequired(URLRequest* request, |
| + const AuthChallengeInfo& auth_info, |
| + const AuthCallback& callback, |
| + AuthCredentials* credentials) override { |
| + ++counters_["on_auth_required_count"]; |
| + return NetworkDelegate::AUTH_REQUIRED_RESPONSE_NO_ACTION; |
| + } |
| + |
| + bool OnCanGetCookies(const URLRequest& request, |
| + const CookieList& cookie_list) override { |
| + ++counters_["on_can_get_cookies_count"]; |
| + return false; |
| + } |
| + |
| + bool OnCanSetCookie(const URLRequest& request, |
| + const std::string& cookie_line, |
| + CookieOptions* options) override { |
| + ++counters_["on_can_set_cookie_count"]; |
| + return false; |
| + } |
| + |
| + CountersMap counters_; |
| +}; |
| + |
| +class TestNetworkDelegateImplMock : public TestNetworkDelegateImpl { |
| + public: |
| + TestNetworkDelegateImplMock() { |
| + } |
| + |
| + ~TestNetworkDelegateImplMock() override { |
| + } |
| + |
| + MOCK_CONST_METHOD2(OnCanAccessFile, |
| + bool(const URLRequest& request, |
| + const base::FilePath& path)); |
| + |
| + MOCK_CONST_METHOD1(OnCanThrottleRequest, |
| + bool(const URLRequest& request)); |
| + |
| + MOCK_CONST_METHOD2(OnCanEnablePrivacyMode, |
| + bool(const GURL& url, |
| + const GURL& first_party_for_cookies)); |
| + |
| + MOCK_CONST_METHOD3( |
| + OnCancelURLRequestWithPolicyViolatingReferrerHeader, |
| + bool(const URLRequest& request, |
| + const GURL& target_url, |
| + const GURL& referrer_url)); |
| +}; |
| + |
| +class TestLayeredNetworkDelegate : public LayeredNetworkDelegate { |
| + public: |
| + TestLayeredNetworkDelegate(scoped_ptr<NetworkDelegate> network_delegate) |
| + : LayeredNetworkDelegate(network_delegate.Pass()), |
| + context_(true) { |
| + context_.Init(); |
| + } |
| + |
| + ~TestLayeredNetworkDelegate() override { |
| + } |
| + |
| + void MakeCalls() { |
| + scoped_refptr<AuthChallengeInfo> auth_challenge( new AuthChallengeInfo()); |
| + scoped_ptr<URLRequest> request = context_.CreateRequest( |
| + GURL(), IDLE, &delegate_, NULL); |
| + scoped_ptr<HttpRequestHeaders> request_headers(new HttpRequestHeaders()); |
| + scoped_refptr<HttpResponseHeaders> response_headers( |
| + new HttpResponseHeaders("")); |
| + TestCompletionCallback completion_callback; |
| + OnBeforeURLRequest(request.get(), completion_callback.callback(), NULL); |
| + OnResolveProxy(GURL(), 0, |
| + ProxyService(new TestProxyConfigService(), NULL, NULL), |
| + new ProxyInfo()); |
| + OnProxyFallback(ProxyServer(), 0); |
| + OnBeforeSendHeaders( |
| + NULL, completion_callback.callback(), request_headers.get()); |
| + OnBeforeSendProxyHeaders(NULL, ProxyInfo(), request_headers.get()); |
| + OnSendHeaders(NULL, *request_headers.get()); |
| + OnHeadersReceived( |
| + NULL, completion_callback.callback(), |
| + response_headers.get(), NULL, NULL); |
| + OnResponseStarted(request.get()); |
| + OnRawBytesRead(*request.get(), 0); |
|
mmenke
2014/12/03 18:50:38
Think *request can be used instead of *request.get
megjablon
2014/12/04 01:23:46
Done.
|
| + OnCompleted(request.get(), false); |
| + OnURLRequestDestroyed(request.get()); |
| + OnPACScriptError(0, base::string16()); |
| + OnAuthRequired(request.get(), *auth_challenge.get(), AuthCallback(), NULL); |
| + OnCanGetCookies(*request.get(), CookieList()); |
| + OnCanSetCookie(*request.get(), std::string(), NULL); |
| + OnCanAccessFile(*request.get(), base::FilePath()); |
| + OnCanThrottleRequest(*request.get()); |
| + OnCanEnablePrivacyMode(GURL(), GURL()); |
| + OnCancelURLRequestWithPolicyViolatingReferrerHeader( |
| + *request.get(), GURL(), GURL()); |
|
mmenke
2014/12/03 18:50:38
Maybe use EXPECT_EQ for those that return values?
megjablon
2014/12/04 01:23:46
Done.
|
| + } |
| + |
| + void VerifyCalled(int64 count) { |
| + VerifyCounters(counters_, count); |
| + } |
| + |
| + private: |
| + void OnBeforeURLRequestInternal(URLRequest* request, |
| + const CompletionCallback& callback, |
| + GURL* new_url) override { |
| + ++counters_["on_before_url_request_count"]; |
| + } |
| + |
| + void OnResolveProxyInternal(const GURL& url, |
| + int load_flags, |
| + const ProxyService& proxy_service, |
| + ProxyInfo* result) override { |
| + ++counters_["on_resolve_proxy_count"]; |
| + } |
| + |
| + void OnProxyFallbackInternal(const ProxyServer& bad_proxy, |
| + int net_error) override { |
| + ++counters_["on_proxy_fallback_count"]; |
| + } |
| + |
| + void OnBeforeSendHeadersInternal(URLRequest* request, |
| + const CompletionCallback& callback, |
| + HttpRequestHeaders* headers) override { |
| + ++counters_["on_before_send_headers_count"]; |
| + } |
| + |
| + void OnBeforeSendProxyHeadersInternal(URLRequest* request, |
| + const ProxyInfo& proxy_info, |
| + HttpRequestHeaders* headers) override { |
| + ++counters_["on_before_send_proxy_headers_count"]; |
| + } |
| + |
| + void OnSendHeadersInternal(URLRequest* request, |
| + const HttpRequestHeaders& headers) override { |
| + |
| + ++counters_["on_send_headers_count"]; |
| + } |
| + |
| + void OnHeadersReceivedInternal( |
| + URLRequest* request, |
| + const CompletionCallback& callback, |
| + const HttpResponseHeaders* original_response_headers, |
| + scoped_refptr<HttpResponseHeaders>* override_response_headers, |
| + GURL* allowed_unsafe_redirect_url) override { |
| + ++counters_["on_headers_received_count"]; |
| + } |
| + |
| + void OnBeforeRedirectInternal(URLRequest* request, |
| + const GURL& new_location) override { |
| + ++counters_["on_before_redirect_count"]; |
| + } |
| + |
| + void OnResponseStartedInternal(URLRequest* request) override { |
| + ++counters_["on_response_started_count"]; |
| + } |
| + |
| + void OnRawBytesReadInternal(const URLRequest& request, |
| + int bytes_read) override { |
| + ++counters_["on_raw_bytes_read_count"]; |
| + } |
| + |
| + void OnCompletedInternal(URLRequest* request, bool started) override { |
| + ++counters_["on_completed_count"]; |
| + } |
| + |
| + void OnURLRequestDestroyedInternal(URLRequest* request) override { |
| + ++counters_["on_url_request_destroyed_count"]; |
| + } |
| + |
| + void OnPACScriptErrorInternal(int line_number, |
| + const base::string16& error) override { |
| + ++counters_["on_pac_script_error_count"]; |
| + } |
| + |
| + void OnAuthRequiredInternal(URLRequest* request, |
| + const AuthChallengeInfo& auth_info, |
| + const AuthCallback& callback, |
| + AuthCredentials* credentials) override { |
| + ++counters_["on_auth_required_count"]; |
| + } |
| + |
| + void OnCanGetCookiesInternal(const URLRequest& request, |
| + const CookieList& cookie_list) override { |
| + ++counters_["on_can_get_cookies_count"]; |
| + } |
| + |
| + void OnCanSetCookieInternal(const URLRequest& request, |
| + const std::string& cookie_line, |
| + CookieOptions* options) override { |
| + ++counters_["on_can_set_cookie_count"]; |
| + } |
| + |
| + TestURLRequestContext context_; |
| + TestDelegate delegate_; |
| + CountersMap counters_; |
|
mmenke
2014/12/03 18:50:38
DISALLOW_COPY_AND_ASSIGN
megjablon
2014/12/04 01:23:46
Done.
|
| +}; |
| + |
| +class TestLayeredNetworkDelegateMock : public TestLayeredNetworkDelegate { |
| + public: |
| + TestLayeredNetworkDelegateMock(scoped_ptr<NetworkDelegate> network_delegate) |
| + : TestLayeredNetworkDelegate(network_delegate.Pass()) { |
| + } |
| + |
| + ~TestLayeredNetworkDelegateMock() override { |
| + } |
| + |
| + MOCK_CONST_METHOD2(OnCanAccessFileInternal, |
|
mmenke
2014/12/03 18:50:38
Probably shouldn't be using gmock, so hacking on C
megjablon
2014/12/04 01:23:46
Done.
|
| + void(const URLRequest& request, |
| + const base::FilePath& path)); |
| + |
| + MOCK_CONST_METHOD1(OnCanThrottleRequestInternal, |
| + void(const URLRequest& request)); |
| + |
| + MOCK_CONST_METHOD2(OnCanEnablePrivacyModeInternal, |
| + void(const GURL& url, |
| + const GURL& first_party_for_cookies)); |
| + |
| + MOCK_CONST_METHOD3( |
| + OnCancelURLRequestWithPolicyViolatingReferrerHeaderInternal, |
| + void(const URLRequest& request, |
| + const GURL& target_url, |
| + const GURL& referrer_url)); |
| +}; |
| + |
| +class LayeredNetworkDelegateTest : public testing::Test { |
| + public: |
| + LayeredNetworkDelegateTest() { |
| + scoped_ptr<TestNetworkDelegateImplMock> test_network_delegate( |
| + new TestNetworkDelegateImplMock()); |
| + test_network_delegate_ = test_network_delegate.get(); |
| + layered_network_delegate_ = scoped_ptr<TestLayeredNetworkDelegateMock>( |
| + new TestLayeredNetworkDelegateMock(test_network_delegate.Pass())); |
| + } |
| + |
| + TestNetworkDelegateImplMock* test_network_delegate_; |
| + scoped_ptr<TestLayeredNetworkDelegateMock> layered_network_delegate_; |
| +}; |
| + |
| +TEST_F(LayeredNetworkDelegateTest, VerifyLayeredNetworkDelegateInternal) { |
| + EXPECT_CALL(*test_network_delegate_, OnCanAccessFile(testing::_, testing::_)); |
| + EXPECT_CALL(*test_network_delegate_, OnCanThrottleRequest(testing::_)); |
| + EXPECT_CALL(*test_network_delegate_, |
| + OnCanEnablePrivacyMode(testing::_, testing::_)); |
| + EXPECT_CALL(*test_network_delegate_, |
| + OnCancelURLRequestWithPolicyViolatingReferrerHeader( |
| + testing::_, testing::_, testing::_)); |
| + |
| + EXPECT_CALL(*layered_network_delegate_.get(), |
| + OnCanAccessFileInternal(testing::_, testing::_)); |
|
mmenke
2014/12/03 18:50:38
Why are these calls separated out?
megjablon
2014/12/04 01:23:46
Done.
|
| + EXPECT_CALL(*layered_network_delegate_.get(), |
| + OnCanThrottleRequestInternal(testing::_)); |
| + EXPECT_CALL(*layered_network_delegate_.get(), |
| + OnCanEnablePrivacyModeInternal(testing::_, testing::_)); |
| + EXPECT_CALL(*layered_network_delegate_.get(), |
| + OnCancelURLRequestWithPolicyViolatingReferrerHeaderInternal( |
| + testing::_, testing::_, testing::_)); |
| + |
| + layered_network_delegate_->MakeCalls(); |
| + |
| + test_network_delegate_->VerifyCalled(1); |
| + layered_network_delegate_->VerifyCalled(1); |
|
mmenke
2014/12/03 18:50:38
Should compare the total number of calls to the tw
megjablon
2014/12/04 01:23:46
This is now checked in IncrementAndCompareCounter
|
| +} |
| + |
| +} // namespace net |