Index: components/data_reduction_proxy/core/browser/data_reduction_proxy_auth_request_handler_unittest.cc |
diff --git a/components/data_reduction_proxy/core/browser/data_reduction_proxy_auth_request_handler_unittest.cc b/components/data_reduction_proxy/core/browser/data_reduction_proxy_auth_request_handler_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..647cac1de2d0c3e0f005c0afa5f309ff86694174 |
--- /dev/null |
+++ b/components/data_reduction_proxy/core/browser/data_reduction_proxy_auth_request_handler_unittest.cc |
@@ -0,0 +1,322 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+ |
+#include "components/data_reduction_proxy/core/browser/data_reduction_proxy_auth_request_handler.h" |
+ |
+#include "base/md5.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "base/run_loop.h" |
+#include "base/strings/string16.h" |
+#include "base/strings/utf_string_conversions.h" |
+#include "base/time/time.h" |
+#include "components/data_reduction_proxy/core/browser/data_reduction_proxy_settings_test_utils.h" |
+#include "components/data_reduction_proxy/core/common/data_reduction_proxy_params_test_utils.h" |
+#include "net/base/auth.h" |
+#include "net/base/host_port_pair.h" |
+#include "net/proxy/proxy_server.h" |
+#include "testing/gmock/include/gmock/gmock.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace { |
+const char kChromeProxyHeader[] = "chrome-proxy"; |
+const char kOtherProxy[] = "testproxy:17"; |
+ |
+const char kVersion[] = "0.1.2.3"; |
+const char kExpectedBuild[] = "2"; |
+const char kExpectedPatch[] = "3"; |
+const char kBogusVersion[] = "0.0"; |
+const char kTestKey[] = "test-key"; |
+const char kExpectedCredentials[] = "96bd72ec4a050ba60981743d41787768"; |
+const char kExpectedSession[] = "0-1633771873-1633771873-1633771873"; |
+ |
+const char kTestKey2[] = "test-key2"; |
+const char kExpectedCredentials2[] = "c911fdb402f578787562cf7f00eda972"; |
+const char kExpectedSession2[] = "0-1633771873-1633771873-1633771873"; |
+const char kDataReductionProxyKey[] = "12345"; |
+} // namespace |
+ |
+ |
+namespace data_reduction_proxy { |
+namespace { |
+ |
+#if defined(OS_ANDROID) |
+const Client kClient = Client::CHROME_ANDROID; |
+const char kClientStr[] = "android"; |
+#elif defined(OS_IOS) |
+const Client kClient = Client::CHROME_IOS; |
+const char kClientStr[] = "ios"; |
+#elif defined(OS_MACOSX) |
+const Client kClient = Client::CHROME_MAC; |
+const char kClientStr[] = "mac"; |
+#elif defined(OS_CHROMEOS) |
+const Client kClient = Client::CHROME_CHROMEOS; |
+const char kClientStr[] = "chromeos"; |
+#elif defined(OS_LINUX) |
+const Client kClient = Client::CHROME_LINUX; |
+const char kClientStr[] = "linux"; |
+#elif defined(OS_WIN) |
+const Client kClient = Client::CHROME_WINDOWS; |
+const char kClientStr[] = "win"; |
+#elif defined(OS_FREEBSD) |
+const Client kClient = Client::CHROME_FREEBSD; |
+const char kClientStr[] = "freebsd"; |
+#elif defined(OS_OPENBSD) |
+const Client kClient = Client::CHROME_OPENBSD; |
+const char kClientStr[] = "openbsd"; |
+#elif defined(OS_SOLARIS) |
+const Client kClient = Client::CHROME_SOLARIS; |
+const char kClientStr[] = "solaris"; |
+#elif defined(OS_QNX) |
+const Client kClient = Client::CHROME_QNX; |
+const char kClientStr[] = "qnx"; |
+#else |
+const Client kClient = Client::UNKNOWN; |
+const char kClientStr[] = ""; |
+#endif |
+ |
+const std::string kExpectedHeader2 = |
+ std::string("ps=0-1633771873-1633771873-1633771873, ") + |
+ std::string("sid=c911fdb402f578787562cf7f00eda972, b=2, p=3, c=") + |
+ kClientStr; |
+const std::string kExpectedHeader3 = |
+ std::string("ps=86401-1633771873-1633771873-1633771873, ") + |
+ std::string("sid=d7c1c34ef6b90303b01c48a6c1db6419, b=2, p=3, c=") + |
+ kClientStr; |
+const std::string kExpectedHeader4 = |
+ std::string("ps=0-1633771873-1633771873-1633771873, ") + |
+ std::string("sid=c911fdb402f578787562cf7f00eda972, c=") + |
+ kClientStr; |
+ |
+class TestDataReductionProxyAuthRequestHandler |
+ : public DataReductionProxyAuthRequestHandler { |
+ public: |
+ TestDataReductionProxyAuthRequestHandler( |
+ Client client, |
+ const std::string& version, |
+ DataReductionProxyParams* params, |
+ base::MessageLoopProxy* loop_proxy) |
+ : DataReductionProxyAuthRequestHandler( |
+ client, version, params, loop_proxy) {} |
+ |
+ std::string GetDefaultKey() const override { return kTestKey; } |
+ |
+ base::Time Now() const override { |
+ return base::Time::UnixEpoch() + now_offset_; |
+ } |
+ |
+ void RandBytes(void* output, size_t length) override { |
+ char* c = static_cast<char*>(output); |
+ for (size_t i = 0; i < length; ++i) { |
+ c[i] = 'a'; |
+ } |
+ } |
+ |
+ // Time after the unix epoch that Now() reports. |
+ void set_offset(const base::TimeDelta& now_offset) { |
+ now_offset_ = now_offset; |
+ } |
+ |
+ private: |
+ base::TimeDelta now_offset_; |
+}; |
+ |
+} // namespace |
+ |
+class DataReductionProxyAuthRequestHandlerTest : public testing::Test { |
+ public: |
+ DataReductionProxyAuthRequestHandlerTest() |
+ : loop_proxy_(base::MessageLoopProxy::current().get()) { |
+ } |
+ // Required for MessageLoopProxy::current(). |
+ base::MessageLoopForUI loop_; |
+ base::MessageLoopProxy* loop_proxy_; |
+}; |
+ |
+TEST_F(DataReductionProxyAuthRequestHandlerTest, AuthorizationOnIOThread) { |
+ scoped_ptr<TestDataReductionProxyParams> params; |
+ params.reset( |
+ new TestDataReductionProxyParams( |
+ DataReductionProxyParams::kAllowed | |
+ DataReductionProxyParams::kFallbackAllowed | |
+ DataReductionProxyParams::kPromoAllowed, |
+ TestDataReductionProxyParams::HAS_EVERYTHING & |
+ ~TestDataReductionProxyParams::HAS_DEV_ORIGIN & |
+ ~TestDataReductionProxyParams::HAS_DEV_FALLBACK_ORIGIN)); |
+ // loop_proxy_ is just the current message loop. This means loop_proxy_ |
+ // is the network thread used by DataReductionProxyAuthRequestHandler. |
+ TestDataReductionProxyAuthRequestHandler auth_handler(kClient, |
+ kVersion, |
+ params.get(), |
+ loop_proxy_); |
+ auth_handler.Init(); |
+ base::RunLoop().RunUntilIdle(); |
+ EXPECT_EQ(auth_handler.client_, kClientStr); |
+ EXPECT_EQ(kExpectedBuild, auth_handler.build_number_); |
+ EXPECT_EQ(kExpectedPatch, auth_handler.patch_number_); |
+ EXPECT_EQ(auth_handler.key_, kTestKey); |
+ EXPECT_EQ(kExpectedCredentials, auth_handler.credentials_); |
+ EXPECT_EQ(kExpectedSession, auth_handler.session_); |
+ |
+ // Now set a key. |
+ auth_handler.InitAuthentication(kTestKey2); |
+ base::RunLoop().RunUntilIdle(); |
+ EXPECT_EQ(kTestKey2, auth_handler.key_); |
+ EXPECT_EQ(kExpectedCredentials2, auth_handler.credentials_); |
+ EXPECT_EQ(kExpectedSession2, auth_handler.session_); |
+ |
+ // Don't write headers if the proxy is invalid. |
+ net::HttpRequestHeaders headers; |
+ auth_handler.MaybeAddRequestHeader(NULL, net::ProxyServer(), &headers); |
+ EXPECT_FALSE(headers.HasHeader(kChromeProxyHeader)); |
+ |
+ // Don't write headers with a valid proxy, that's not a data reduction proxy. |
+ auth_handler.MaybeAddRequestHeader( |
+ NULL, |
+ net::ProxyServer::FromURI(kOtherProxy, net::ProxyServer::SCHEME_HTTP), |
+ &headers); |
+ EXPECT_FALSE(headers.HasHeader(kChromeProxyHeader)); |
+ |
+ // Don't write headers with a valid data reduction ssl proxy. |
+ auth_handler.MaybeAddRequestHeader( |
+ NULL, |
+ net::ProxyServer::FromURI(params->DefaultSSLOrigin(), |
+ net::ProxyServer::SCHEME_HTTP), |
+ &headers); |
+ EXPECT_FALSE(headers.HasHeader(kChromeProxyHeader)); |
+ |
+ // Write headers with a valid data reduction proxy. |
+ auth_handler.MaybeAddRequestHeader( |
+ NULL, |
+ net::ProxyServer::FromURI(params->DefaultOrigin(), |
+ net::ProxyServer::SCHEME_HTTP), |
+ &headers); |
+ EXPECT_TRUE(headers.HasHeader(kChromeProxyHeader)); |
+ std::string header_value; |
+ headers.GetHeader(kChromeProxyHeader, &header_value); |
+ EXPECT_EQ(kExpectedHeader2, header_value); |
+ |
+ // Write headers with a valid data reduction ssl proxy when one is expected. |
+ net::HttpRequestHeaders ssl_headers; |
+ auth_handler.MaybeAddProxyTunnelRequestHandler( |
+ net::ProxyServer::FromURI( |
+ params->DefaultSSLOrigin(), |
+ net::ProxyServer::SCHEME_HTTP).host_port_pair(), |
+ &ssl_headers); |
+ EXPECT_TRUE(ssl_headers.HasHeader(kChromeProxyHeader)); |
+ std::string ssl_header_value; |
+ ssl_headers.GetHeader(kChromeProxyHeader, &ssl_header_value); |
+ EXPECT_EQ(kExpectedHeader2, ssl_header_value); |
+ |
+ // Fast forward 24 hours. The header should be the same. |
+ auth_handler.set_offset(base::TimeDelta::FromSeconds(24 * 60 * 60)); |
+ net::HttpRequestHeaders headers2; |
+ // Write headers with a valid data reduction proxy. |
+ auth_handler.MaybeAddRequestHeader( |
+ NULL, |
+ net::ProxyServer::FromURI(params->DefaultOrigin(), |
+ net::ProxyServer::SCHEME_HTTP), |
+ &headers2); |
+ EXPECT_TRUE(headers2.HasHeader(kChromeProxyHeader)); |
+ std::string header_value2; |
+ headers2.GetHeader(kChromeProxyHeader, &header_value2); |
+ EXPECT_EQ(kExpectedHeader2, header_value2); |
+ |
+ // Fast forward one more second. The header should be new. |
+ auth_handler.set_offset(base::TimeDelta::FromSeconds(24 * 60 * 60 + 1)); |
+ net::HttpRequestHeaders headers3; |
+ // Write headers with a valid data reduction proxy. |
+ auth_handler.MaybeAddRequestHeader( |
+ NULL, |
+ net::ProxyServer::FromURI(params->DefaultOrigin(), |
+ net::ProxyServer::SCHEME_HTTP), |
+ &headers3); |
+ EXPECT_TRUE(headers3.HasHeader(kChromeProxyHeader)); |
+ std::string header_value3; |
+ headers3.GetHeader(kChromeProxyHeader, &header_value3); |
+ EXPECT_EQ(kExpectedHeader3, header_value3); |
+} |
+ |
+TEST_F(DataReductionProxyAuthRequestHandlerTest, AuthorizationIgnoresEmptyKey) { |
+scoped_ptr<TestDataReductionProxyParams> params; |
+ params.reset( |
+ new TestDataReductionProxyParams( |
+ DataReductionProxyParams::kAllowed | |
+ DataReductionProxyParams::kFallbackAllowed | |
+ DataReductionProxyParams::kPromoAllowed, |
+ TestDataReductionProxyParams::HAS_EVERYTHING & |
+ ~TestDataReductionProxyParams::HAS_DEV_ORIGIN & |
+ ~TestDataReductionProxyParams::HAS_DEV_FALLBACK_ORIGIN)); |
+ // loop_proxy_ is just the current message loop. This means loop_proxy_ |
+ // is the network thread used by DataReductionProxyAuthRequestHandler. |
+ TestDataReductionProxyAuthRequestHandler auth_handler(kClient, |
+ kVersion, |
+ params.get(), |
+ loop_proxy_); |
+ auth_handler.Init(); |
+ base::RunLoop().RunUntilIdle(); |
+ EXPECT_EQ(auth_handler.client_, kClientStr); |
+ EXPECT_EQ(kExpectedBuild, auth_handler.build_number_); |
+ EXPECT_EQ(kExpectedPatch, auth_handler.patch_number_); |
+ EXPECT_EQ(auth_handler.key_, kTestKey); |
+ EXPECT_EQ(kExpectedCredentials, auth_handler.credentials_); |
+ EXPECT_EQ(kExpectedSession, auth_handler.session_); |
+ |
+ // Now set an empty key. The auth handler should ignore that, and the key |
+ // remains |kTestKey|. |
+ auth_handler.InitAuthentication(""); |
+ base::RunLoop().RunUntilIdle(); |
+ EXPECT_EQ(auth_handler.key_, kTestKey); |
+ EXPECT_EQ(kExpectedCredentials, auth_handler.credentials_); |
+ EXPECT_EQ(kExpectedSession, auth_handler.session_); |
+} |
+ |
+TEST_F(DataReductionProxyAuthRequestHandlerTest, AuthorizationBogusVersion) { |
+ scoped_ptr<TestDataReductionProxyParams> params; |
+ params.reset( |
+ new TestDataReductionProxyParams( |
+ DataReductionProxyParams::kAllowed | |
+ DataReductionProxyParams::kFallbackAllowed | |
+ DataReductionProxyParams::kPromoAllowed, |
+ TestDataReductionProxyParams::HAS_EVERYTHING & |
+ ~TestDataReductionProxyParams::HAS_DEV_ORIGIN & |
+ ~TestDataReductionProxyParams::HAS_DEV_FALLBACK_ORIGIN)); |
+ TestDataReductionProxyAuthRequestHandler auth_handler(kClient, |
+ kBogusVersion, |
+ params.get(), |
+ loop_proxy_); |
+ EXPECT_TRUE(auth_handler.build_number_.empty()); |
+ EXPECT_TRUE(auth_handler.patch_number_.empty()); |
+ |
+ // Now set a key. |
+ auth_handler.InitAuthentication(kTestKey2); |
+ base::RunLoop().RunUntilIdle(); |
+ EXPECT_EQ(kTestKey2, auth_handler.key_); |
+ EXPECT_EQ(kExpectedCredentials2, auth_handler.credentials_); |
+ EXPECT_EQ(kExpectedSession2, auth_handler.session_); |
+ |
+ net::HttpRequestHeaders headers; |
+ // Write headers with a valid data reduction proxy; |
+ auth_handler.MaybeAddRequestHeader( |
+ NULL, |
+ net::ProxyServer::FromURI( |
+ params->DefaultOrigin(), |
+ net::ProxyServer::SCHEME_HTTP), |
+ &headers); |
+ EXPECT_TRUE(headers.HasHeader(kChromeProxyHeader)); |
+ std::string header_value; |
+ headers.GetHeader(kChromeProxyHeader, &header_value); |
+ EXPECT_EQ(kExpectedHeader4, header_value); |
+} |
+ |
+TEST_F(DataReductionProxyAuthRequestHandlerTest, AuthHashForSalt) { |
+ std::string salt = "8675309"; // Jenny's number to test the hash generator. |
+ std::string salted_key = salt + kDataReductionProxyKey + salt; |
+ base::string16 expected_hash = base::UTF8ToUTF16(base::MD5String(salted_key)); |
+ EXPECT_EQ(expected_hash, |
+ DataReductionProxyAuthRequestHandler::AuthHashForSalt( |
+ 8675309, kDataReductionProxyKey)); |
+} |
+ |
+} // namespace data_reduction_proxy |