Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1383)

Unified Diff: net/base/layered_network_delegate_unittest.cc

Issue 734263003: Move data reduction proxy logic out of chrome and android webview network delegate (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Adding inits to DRPNetworkDelegate Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/layered_network_delegate_unittest.cc
diff --git a/net/base/layered_network_delegate_unittest.cc b/net/base/layered_network_delegate_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..a64799326010fdb89049c0b09b908dd669d9dbc7
--- /dev/null
+++ b/net/base/layered_network_delegate_unittest.cc
@@ -0,0 +1,400 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/base/layered_network_delegate.h"
+
+#include "base/bind.h"
+#include "base/files/file_path.h"
+#include "base/memory/ref_counted.h"
+#include "base/memory/scoped_ptr.h"
+#include "net/base/auth.h"
+#include "net/base/net_errors.h"
+#include "net/base/network_delegate_impl.h"
+#include "net/base/request_priority.h"
+#include "net/base/test_completion_callback.h"
+#include "net/http/http_response_headers.h"
+#include "net/proxy/proxy_config_service.h"
+#include "net/proxy/proxy_info.h"
+#include "net/proxy/proxy_service.h"
+#include "net/url_request/url_request.h"
+#include "net/url_request/url_request_test_util.h"
+#include "testing/gmock/include/gmock/gmock.h"
+#include "testing/gtest/include/gtest/gtest.h"
+#include "url/gurl.h"
+
+namespace net {
+
+typedef std::map<const char*, int> CountersMap;
mmenke 2014/12/03 18:50:38 include map.
megjablon 2014/12/04 01:23:46 Done.
+
+void VerifyCounters(CountersMap counters, int64 count) {
mmenke 2014/12/03 18:50:38 int64 not needed
mmenke 2014/12/03 18:50:38 Actually, can you just get rid of this method, and
megjablon 2014/12/04 01:23:46 Done.
+ for (CountersMap::iterator iter = counters.begin();
+ iter != counters.end(); ++iter) {
+ EXPECT_EQ(count, iter->second);
+ }
+}
+
+class TestProxyConfigService : public ProxyConfigService {
mmenke 2014/12/03 18:50:38 Not needed. Can just use ProxyService::CreateDire
megjablon 2014/12/04 01:23:46 Done.
+ public:
+ TestProxyConfigService() {
+ }
+
+ void AddObserver(ProxyConfigService::Observer* observer) override {
+ }
+
+ void RemoveObserver(ProxyConfigService::Observer* observer) override {
+ }
+
+ ConfigAvailability GetLatestProxyConfig(ProxyConfig* config) override {
+ return ProxyConfigService::CONFIG_VALID;
+ }
+};
+
+class TestNetworkDelegateImpl : public NetworkDelegateImpl {
+ public:
+ TestNetworkDelegateImpl() {
+ }
+
+ ~TestNetworkDelegateImpl() override {
+ }
+
+ void VerifyCalled(int64 count) {
+ VerifyCounters(counters_, count);
+ }
+
+ private:
+ int OnBeforeURLRequest(URLRequest* request,
+ const CompletionCallback& callback,
+ GURL* new_url) override {
+ ++counters_["on_before_url_request_count"];
mmenke 2014/12/03 18:50:38 Hrm... It's a pain, but if we want to be complete
megjablon 2014/12/04 01:23:46 Done.
+ return OK;
+ }
+
+ void OnResolveProxy(const GURL& url,
+ int load_flags,
+ const ProxyService& proxy_service,
+ ProxyInfo* result) override {
+ ++counters_["on_resolve_proxy_count"];
+ }
+
+ void OnProxyFallback(const ProxyServer& bad_proxy, int net_error) override {
+ ++counters_["on_proxy_fallback_count"];
+ }
+
+ int OnBeforeSendHeaders(URLRequest* request,
+ const CompletionCallback& callback,
+ HttpRequestHeaders* headers) override {
+ ++counters_["on_before_send_headers_count"];
+ return OK;
+ }
+
+ void OnBeforeSendProxyHeaders(URLRequest* request,
+ const ProxyInfo& proxy_info,
+ HttpRequestHeaders* headers) override {
+ ++counters_["on_before_send_proxy_headers_count"];
+ }
+
+ void OnSendHeaders(URLRequest* request,
+ const HttpRequestHeaders& headers) override {
+ ++counters_["on_send_headers_count"];
+ }
+
+ int OnHeadersReceived(
+ URLRequest* request,
+ const CompletionCallback& callback,
+ const HttpResponseHeaders* original_response_headers,
+ scoped_refptr<HttpResponseHeaders>* override_response_headers,
+ GURL* allowed_unsafe_redirect_url) override {
+ ++counters_["on_headers_received_count"];
+ return OK;
+ }
+
+ void OnBeforeRedirect(URLRequest* request,
+ const GURL& new_location) override {
+ ++counters_["on_before_redirect_count"];
+ }
+
+ void OnResponseStarted(URLRequest* request) override {
+ ++counters_["on_response_started_count"];
+ }
+
+ void OnRawBytesRead(const URLRequest& request, int bytes_read) override {
+ ++counters_["on_raw_bytes_read_count"];
+ }
+
+ void OnCompleted(URLRequest* request, bool started) override {
+ ++counters_["on_completed_count"];
+ }
+
+ void OnURLRequestDestroyed(URLRequest* request) override {
+ ++counters_["on_url_request_destroyed_count"];
+ }
+
+ void OnPACScriptError(int line_number,
+ const base::string16& error) override {
+ ++counters_["on_pac_script_error_count"];
+ }
+
+ AuthRequiredResponse OnAuthRequired(URLRequest* request,
+ const AuthChallengeInfo& auth_info,
+ const AuthCallback& callback,
+ AuthCredentials* credentials) override {
+ ++counters_["on_auth_required_count"];
+ return NetworkDelegate::AUTH_REQUIRED_RESPONSE_NO_ACTION;
+ }
+
+ bool OnCanGetCookies(const URLRequest& request,
+ const CookieList& cookie_list) override {
+ ++counters_["on_can_get_cookies_count"];
+ return false;
+ }
+
+ bool OnCanSetCookie(const URLRequest& request,
+ const std::string& cookie_line,
+ CookieOptions* options) override {
+ ++counters_["on_can_set_cookie_count"];
+ return false;
+ }
+
+ CountersMap counters_;
+};
+
+class TestNetworkDelegateImplMock : public TestNetworkDelegateImpl {
+ public:
+ TestNetworkDelegateImplMock() {
+ }
+
+ ~TestNetworkDelegateImplMock() override {
+ }
+
+ MOCK_CONST_METHOD2(OnCanAccessFile,
+ bool(const URLRequest& request,
+ const base::FilePath& path));
+
+ MOCK_CONST_METHOD1(OnCanThrottleRequest,
+ bool(const URLRequest& request));
+
+ MOCK_CONST_METHOD2(OnCanEnablePrivacyMode,
+ bool(const GURL& url,
+ const GURL& first_party_for_cookies));
+
+ MOCK_CONST_METHOD3(
+ OnCancelURLRequestWithPolicyViolatingReferrerHeader,
+ bool(const URLRequest& request,
+ const GURL& target_url,
+ const GURL& referrer_url));
+};
+
+class TestLayeredNetworkDelegate : public LayeredNetworkDelegate {
+ public:
+ TestLayeredNetworkDelegate(scoped_ptr<NetworkDelegate> network_delegate)
+ : LayeredNetworkDelegate(network_delegate.Pass()),
+ context_(true) {
+ context_.Init();
+ }
+
+ ~TestLayeredNetworkDelegate() override {
+ }
+
+ void MakeCalls() {
+ scoped_refptr<AuthChallengeInfo> auth_challenge( new AuthChallengeInfo());
+ scoped_ptr<URLRequest> request = context_.CreateRequest(
+ GURL(), IDLE, &delegate_, NULL);
+ scoped_ptr<HttpRequestHeaders> request_headers(new HttpRequestHeaders());
+ scoped_refptr<HttpResponseHeaders> response_headers(
+ new HttpResponseHeaders(""));
+ TestCompletionCallback completion_callback;
+ OnBeforeURLRequest(request.get(), completion_callback.callback(), NULL);
+ OnResolveProxy(GURL(), 0,
+ ProxyService(new TestProxyConfigService(), NULL, NULL),
+ new ProxyInfo());
+ OnProxyFallback(ProxyServer(), 0);
+ OnBeforeSendHeaders(
+ NULL, completion_callback.callback(), request_headers.get());
+ OnBeforeSendProxyHeaders(NULL, ProxyInfo(), request_headers.get());
+ OnSendHeaders(NULL, *request_headers.get());
+ OnHeadersReceived(
+ NULL, completion_callback.callback(),
+ response_headers.get(), NULL, NULL);
+ OnResponseStarted(request.get());
+ OnRawBytesRead(*request.get(), 0);
mmenke 2014/12/03 18:50:38 Think *request can be used instead of *request.get
megjablon 2014/12/04 01:23:46 Done.
+ OnCompleted(request.get(), false);
+ OnURLRequestDestroyed(request.get());
+ OnPACScriptError(0, base::string16());
+ OnAuthRequired(request.get(), *auth_challenge.get(), AuthCallback(), NULL);
+ OnCanGetCookies(*request.get(), CookieList());
+ OnCanSetCookie(*request.get(), std::string(), NULL);
+ OnCanAccessFile(*request.get(), base::FilePath());
+ OnCanThrottleRequest(*request.get());
+ OnCanEnablePrivacyMode(GURL(), GURL());
+ OnCancelURLRequestWithPolicyViolatingReferrerHeader(
+ *request.get(), GURL(), GURL());
mmenke 2014/12/03 18:50:38 Maybe use EXPECT_EQ for those that return values?
megjablon 2014/12/04 01:23:46 Done.
+ }
+
+ void VerifyCalled(int64 count) {
+ VerifyCounters(counters_, count);
+ }
+
+ private:
+ void OnBeforeURLRequestInternal(URLRequest* request,
+ const CompletionCallback& callback,
+ GURL* new_url) override {
+ ++counters_["on_before_url_request_count"];
+ }
+
+ void OnResolveProxyInternal(const GURL& url,
+ int load_flags,
+ const ProxyService& proxy_service,
+ ProxyInfo* result) override {
+ ++counters_["on_resolve_proxy_count"];
+ }
+
+ void OnProxyFallbackInternal(const ProxyServer& bad_proxy,
+ int net_error) override {
+ ++counters_["on_proxy_fallback_count"];
+ }
+
+ void OnBeforeSendHeadersInternal(URLRequest* request,
+ const CompletionCallback& callback,
+ HttpRequestHeaders* headers) override {
+ ++counters_["on_before_send_headers_count"];
+ }
+
+ void OnBeforeSendProxyHeadersInternal(URLRequest* request,
+ const ProxyInfo& proxy_info,
+ HttpRequestHeaders* headers) override {
+ ++counters_["on_before_send_proxy_headers_count"];
+ }
+
+ void OnSendHeadersInternal(URLRequest* request,
+ const HttpRequestHeaders& headers) override {
+
+ ++counters_["on_send_headers_count"];
+ }
+
+ void OnHeadersReceivedInternal(
+ URLRequest* request,
+ const CompletionCallback& callback,
+ const HttpResponseHeaders* original_response_headers,
+ scoped_refptr<HttpResponseHeaders>* override_response_headers,
+ GURL* allowed_unsafe_redirect_url) override {
+ ++counters_["on_headers_received_count"];
+ }
+
+ void OnBeforeRedirectInternal(URLRequest* request,
+ const GURL& new_location) override {
+ ++counters_["on_before_redirect_count"];
+ }
+
+ void OnResponseStartedInternal(URLRequest* request) override {
+ ++counters_["on_response_started_count"];
+ }
+
+ void OnRawBytesReadInternal(const URLRequest& request,
+ int bytes_read) override {
+ ++counters_["on_raw_bytes_read_count"];
+ }
+
+ void OnCompletedInternal(URLRequest* request, bool started) override {
+ ++counters_["on_completed_count"];
+ }
+
+ void OnURLRequestDestroyedInternal(URLRequest* request) override {
+ ++counters_["on_url_request_destroyed_count"];
+ }
+
+ void OnPACScriptErrorInternal(int line_number,
+ const base::string16& error) override {
+ ++counters_["on_pac_script_error_count"];
+ }
+
+ void OnAuthRequiredInternal(URLRequest* request,
+ const AuthChallengeInfo& auth_info,
+ const AuthCallback& callback,
+ AuthCredentials* credentials) override {
+ ++counters_["on_auth_required_count"];
+ }
+
+ void OnCanGetCookiesInternal(const URLRequest& request,
+ const CookieList& cookie_list) override {
+ ++counters_["on_can_get_cookies_count"];
+ }
+
+ void OnCanSetCookieInternal(const URLRequest& request,
+ const std::string& cookie_line,
+ CookieOptions* options) override {
+ ++counters_["on_can_set_cookie_count"];
+ }
+
+ TestURLRequestContext context_;
+ TestDelegate delegate_;
+ CountersMap counters_;
mmenke 2014/12/03 18:50:38 DISALLOW_COPY_AND_ASSIGN
megjablon 2014/12/04 01:23:46 Done.
+};
+
+class TestLayeredNetworkDelegateMock : public TestLayeredNetworkDelegate {
+ public:
+ TestLayeredNetworkDelegateMock(scoped_ptr<NetworkDelegate> network_delegate)
+ : TestLayeredNetworkDelegate(network_delegate.Pass()) {
+ }
+
+ ~TestLayeredNetworkDelegateMock() override {
+ }
+
+ MOCK_CONST_METHOD2(OnCanAccessFileInternal,
mmenke 2014/12/03 18:50:38 Probably shouldn't be using gmock, so hacking on C
megjablon 2014/12/04 01:23:46 Done.
+ void(const URLRequest& request,
+ const base::FilePath& path));
+
+ MOCK_CONST_METHOD1(OnCanThrottleRequestInternal,
+ void(const URLRequest& request));
+
+ MOCK_CONST_METHOD2(OnCanEnablePrivacyModeInternal,
+ void(const GURL& url,
+ const GURL& first_party_for_cookies));
+
+ MOCK_CONST_METHOD3(
+ OnCancelURLRequestWithPolicyViolatingReferrerHeaderInternal,
+ void(const URLRequest& request,
+ const GURL& target_url,
+ const GURL& referrer_url));
+};
+
+class LayeredNetworkDelegateTest : public testing::Test {
+ public:
+ LayeredNetworkDelegateTest() {
+ scoped_ptr<TestNetworkDelegateImplMock> test_network_delegate(
+ new TestNetworkDelegateImplMock());
+ test_network_delegate_ = test_network_delegate.get();
+ layered_network_delegate_ = scoped_ptr<TestLayeredNetworkDelegateMock>(
+ new TestLayeredNetworkDelegateMock(test_network_delegate.Pass()));
+ }
+
+ TestNetworkDelegateImplMock* test_network_delegate_;
+ scoped_ptr<TestLayeredNetworkDelegateMock> layered_network_delegate_;
+};
+
+TEST_F(LayeredNetworkDelegateTest, VerifyLayeredNetworkDelegateInternal) {
+ EXPECT_CALL(*test_network_delegate_, OnCanAccessFile(testing::_, testing::_));
+ EXPECT_CALL(*test_network_delegate_, OnCanThrottleRequest(testing::_));
+ EXPECT_CALL(*test_network_delegate_,
+ OnCanEnablePrivacyMode(testing::_, testing::_));
+ EXPECT_CALL(*test_network_delegate_,
+ OnCancelURLRequestWithPolicyViolatingReferrerHeader(
+ testing::_, testing::_, testing::_));
+
+ EXPECT_CALL(*layered_network_delegate_.get(),
+ OnCanAccessFileInternal(testing::_, testing::_));
mmenke 2014/12/03 18:50:38 Why are these calls separated out?
megjablon 2014/12/04 01:23:46 Done.
+ EXPECT_CALL(*layered_network_delegate_.get(),
+ OnCanThrottleRequestInternal(testing::_));
+ EXPECT_CALL(*layered_network_delegate_.get(),
+ OnCanEnablePrivacyModeInternal(testing::_, testing::_));
+ EXPECT_CALL(*layered_network_delegate_.get(),
+ OnCancelURLRequestWithPolicyViolatingReferrerHeaderInternal(
+ testing::_, testing::_, testing::_));
+
+ layered_network_delegate_->MakeCalls();
+
+ test_network_delegate_->VerifyCalled(1);
+ layered_network_delegate_->VerifyCalled(1);
mmenke 2014/12/03 18:50:38 Should compare the total number of calls to the tw
megjablon 2014/12/04 01:23:46 This is now checked in IncrementAndCompareCounter
+}
+
+} // namespace net

Powered by Google App Engine
This is Rietveld 408576698