Index: tools/chrome_proxy/integration_tests/chrome_proxy_metrics.py |
diff --git a/tools/chrome_proxy/integration_tests/chrome_proxy_metrics.py b/tools/chrome_proxy/integration_tests/chrome_proxy_metrics.py |
index b9be2832dfa7d7bfcfa5039b1ae941cae106b657..7a070f46a02d0f6339b93435832015513af04c24 100644 |
--- a/tools/chrome_proxy/integration_tests/chrome_proxy_metrics.py |
+++ b/tools/chrome_proxy/integration_tests/chrome_proxy_metrics.py |
@@ -353,7 +353,6 @@ class ChromeProxyMetric(network_metrics.NetworkMetric): |
r.url, r.GetHeader('Via'), r.GetHeader('Referer'), r.status)) |
bypass_count += 1 |
- self.VerifyAllProxiesBypassed(tab) |
bolian
2014/12/09 22:06:14
Not verifying this any more?
sclittle
2014/12/09 22:25:21
Not anymore. The only thing this call gains us her
|
results.AddValue(scalar.ScalarValue( |
results.current_page, 'bypass', 'count', bypass_count)) |
@@ -404,13 +403,6 @@ class ChromeProxyMetric(network_metrics.NetworkMetric): |
if not resp.HasChromeProxyViaHeader(): |
bypass_count += 1 |
- if tab: |
- info = GetProxyInfoFromNetworkInternals(tab) |
- if not info['enabled']: |
- raise ChromeProxyMetricException, ( |
- 'Chrome proxy should be enabled. proxy info: %s' % info) |
- self.VerifyBadProxies(info['badProxies'], []) |
- |
if eligible_response_count <= 1: |
raise ChromeProxyMetricException, ( |
'There should be more than one DRP eligible response ' |
@@ -479,14 +471,27 @@ class ChromeProxyMetric(network_metrics.NetworkMetric): |
if not expected_bad_proxies: |
expected_bad_proxies = [] |
+ # TODO(sclittle): Remove this dependency on net-internals#proxy once an |
+ # alternative method of verifying that Chrome is on the fallback proxy |
+ # exists. |
self.VerifyProxyInfo(tab, expected_proxies, expected_bad_proxies) |
results.AddValue(scalar.ScalarValue( |
results.current_page, 'http_fallback', 'boolean', True)) |
def AddResultsForHTTPToDirectFallback(self, tab, results): |
- self.VerifyAllProxiesBypassed(tab) |
+ bypass_count = 0 |
+ for resp in self.IterResponses(tab): |
+ if resp.HasChromeProxyViaHeader(): |
+ r = resp.response |
+ raise ChromeProxyMetricException, ( |
+ 'Response for %s should not have via header. ' |
+ 'Reponse: status=(%d, %s)\nHeaders:\n %s' % ( |
+ r.url, r.status, r.status_text, r.headers)) |
+ else: |
+ bypass_count += 1 |
+ |
results.AddValue(scalar.ScalarValue( |
- results.current_page, 'direct_fallback', 'boolean', True)) |
+ results.current_page, 'bypass', 'count', bypass_count)) |
bolian
2014/12/09 22:06:14
This result, 'bypass', does not match the func nam
sclittle
2014/12/09 22:25:21
Should it match it? This result is the number of b
|
def AddResultsForExplicitBypass(self, tab, results, expected_bad_proxies): |
"""Verify results for an explicit bypass test. |
@@ -502,6 +507,9 @@ class ChromeProxyMetric(network_metrics.NetworkMetric): |
if not 'enabled' in info or not info['enabled']: |
raise ChromeProxyMetricException, ( |
'Chrome proxy should be enabled. proxy info: %s' % info) |
+ # TODO(sclittle): Remove this dependency on net-internals#proxy once an |
+ # alternative method of verifying that Chrome is on the fallback proxy |
+ # exists. |
self.VerifyBadProxies(info['badProxies'], |
expected_bad_proxies) |
results.AddValue(scalar.ScalarValue( |