OLD | NEW |
---|---|
(Empty) | |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/cert_net/cert_net_fetcher_impl.h" | |
6 | |
7 #include <string> | |
8 | |
9 #include "base/compiler_specific.h" | |
10 #include "base/run_loop.h" | |
11 #include "net/cert/mock_cert_verifier.h" | |
12 #include "net/dns/mock_host_resolver.h" | |
13 #include "net/http/http_server_properties_impl.h" | |
14 #include "net/test/spawned_test_server/spawned_test_server.h" | |
15 #include "net/url_request/url_request_job_factory_impl.h" | |
16 #include "net/url_request/url_request_test_util.h" | |
17 #include "testing/gtest/include/gtest/gtest.h" | |
18 #include "testing/platform_test.h" | |
19 | |
20 // TODO(eroman): Test that cookies aren't sent. | |
21 | |
22 using base::ASCIIToUTF16; | |
23 | |
24 namespace net { | |
25 | |
26 namespace { | |
27 | |
28 const base::FilePath::CharType kDocRoot[] = | |
29 FILE_PATH_LITERAL("net/data/cert_net_fetcher_impl_unittest"); | |
30 | |
31 // A non-mock URLRequestContext which can access http:// urls. | |
32 class RequestContext : public URLRequestContext { | |
33 public: | |
34 RequestContext() : storage_(this) { | |
35 ProxyConfig no_proxy; | |
36 storage_.set_host_resolver(scoped_ptr<HostResolver>(new MockHostResolver)); | |
37 storage_.set_cert_verifier(new MockCertVerifier); | |
38 storage_.set_transport_security_state(new TransportSecurityState); | |
39 storage_.set_proxy_service(ProxyService::CreateFixed(no_proxy)); | |
40 storage_.set_ssl_config_service(new SSLConfigServiceDefaults); | |
41 storage_.set_http_server_properties( | |
42 scoped_ptr<HttpServerProperties>(new HttpServerPropertiesImpl())); | |
43 | |
44 HttpNetworkSession::Params params; | |
45 params.host_resolver = host_resolver(); | |
46 params.cert_verifier = cert_verifier(); | |
47 params.transport_security_state = transport_security_state(); | |
48 params.proxy_service = proxy_service(); | |
49 params.ssl_config_service = ssl_config_service(); | |
50 params.http_server_properties = http_server_properties(); | |
51 scoped_refptr<HttpNetworkSession> network_session( | |
52 new HttpNetworkSession(params)); | |
53 storage_.set_http_transaction_factory(new HttpCache( | |
54 network_session.get(), HttpCache::DefaultBackend::InMemory(0))); | |
55 URLRequestJobFactoryImpl* job_factory = new URLRequestJobFactoryImpl(); | |
56 storage_.set_job_factory(job_factory); | |
57 } | |
58 | |
59 ~RequestContext() override { AssertNoURLRequests(); } | |
60 | |
61 private: | |
62 URLRequestContextStorage storage_; | |
63 }; | |
64 | |
65 class FetchResult { | |
66 public: | |
67 FetchResult(Error net_error, const std::vector<uint8_t>& response_body) | |
68 : net_error_(net_error), response_body_(response_body) {} | |
69 | |
70 void VerifySuccess(const std::string& expected_body) { | |
71 EXPECT_EQ(OK, net_error_); | |
72 EXPECT_EQ(expected_body, | |
73 std::string(response_body_.begin(), response_body_.end())); | |
74 } | |
75 | |
76 void VerifyFailure(Error expected_error) { | |
77 EXPECT_EQ(expected_error, net_error_); | |
78 EXPECT_EQ(0u, response_body_.size()); | |
79 } | |
80 | |
81 private: | |
82 const Error net_error_; | |
83 const std::vector<uint8_t> response_body_; | |
84 }; | |
85 | |
86 // Helper to synchronously wait for the fetch completion. This is similar to | |
87 // net's TestCompletionCallback, but built around FetchCallback. | |
88 class TestFetchCallback { | |
89 public: | |
90 TestFetchCallback() | |
91 : callback_(base::Bind(&TestFetchCallback::OnCallback, | |
92 base::Unretained(this))) {} | |
93 | |
94 const CertNetFetcher::FetchCallback& callback() const { return callback_; } | |
95 | |
96 scoped_ptr<FetchResult> WaitForResult() { | |
97 DCHECK(quit_closure_.is_null()); | |
98 while (!HasResult()) { | |
99 base::RunLoop run_loop; | |
100 quit_closure_ = run_loop.QuitClosure(); | |
101 run_loop.Run(); | |
102 quit_closure_.Reset(); | |
103 } | |
104 return result_.Pass(); | |
105 } | |
106 | |
107 bool HasResult() const { return result_.get(); } | |
108 | |
109 // Sets an extra action (in addition to recording the result) that is run when | |
110 // the FetchCallback is invoked. | |
111 void set_extra_closure(const base::Closure& closure) { | |
112 extra_closure_ = closure; | |
113 } | |
114 | |
115 private: | |
116 void OnCallback(Error net_error, const std::vector<uint8_t>& response_body) { | |
117 DCHECK(!HasResult()); | |
118 result_.reset(new FetchResult(net_error, response_body)); | |
119 | |
120 if (!extra_closure_.is_null()) | |
121 extra_closure_.Run(); | |
122 | |
123 if (!quit_closure_.is_null()) | |
124 quit_closure_.Run(); | |
125 } | |
126 | |
127 CertNetFetcher::FetchCallback callback_; | |
128 scoped_ptr<FetchResult> result_; | |
129 base::Closure quit_closure_; | |
130 base::Closure extra_closure_; | |
131 }; | |
132 | |
133 } // namespace | |
134 | |
135 class CertNetFetcherImplTest : public PlatformTest { | |
136 public: | |
137 CertNetFetcherImplTest() | |
138 : test_server_(SpawnedTestServer::TYPE_HTTP, | |
139 net::SpawnedTestServer::kLocalhost, | |
140 base::FilePath(kDocRoot)) { | |
141 context_.set_network_delegate(&network_delegate_); | |
142 } | |
143 | |
144 protected: | |
145 SpawnedTestServer test_server_; | |
146 TestNetworkDelegate network_delegate_; | |
147 RequestContext context_; | |
148 }; | |
149 | |
150 // Helper to start an AIA fetch using default parameters. | |
151 CertNetFetcher::RequestId StartRequest(const GURL& url, | |
152 const TestFetchCallback& callback, | |
153 CertNetFetcher* fetcher) { | |
davidben
2015/03/31 20:52:25
Nit: Probably makes more sense for the fetcher to
eroman
2015/04/04 21:57:15
I left it last because I thought it was more style
davidben
2015/04/07 19:22:25
Hrm. I see it as more a context than an in/out par
eroman
2015/04/07 20:22:40
Done.
| |
154 return fetcher->FetchCaIssuers(url, CertNetFetcher::DEFAULT, | |
155 CertNetFetcher::DEFAULT, callback.callback()); | |
156 } | |
157 | |
158 // Fetch a few unique URLs using GET in parallel. Each URL has a different body | |
159 // and Content-Type. | |
160 TEST_F(CertNetFetcherImplTest, ParallelFetchNoDupes) { | |
161 ASSERT_TRUE(test_server_.Start()); | |
162 | |
163 CertNetFetcherImpl fetcher(&context_); | |
164 TestFetchCallback callback1; | |
165 TestFetchCallback callback2; | |
166 TestFetchCallback callback3; | |
167 | |
168 // Request a URL with Content-Type "application/pkix-cert" | |
169 GURL url1 = test_server_.GetURL("files/cert.crt"); | |
170 StartRequest(url1, callback1, &fetcher); | |
171 | |
172 // Request a URL with Content-Type "application/pkix-crl" | |
173 GURL url2 = test_server_.GetURL("files/root.crl"); | |
174 StartRequest(url2, callback2, &fetcher); | |
175 | |
176 // Request a URL with Content-Type "application/pkcs7-mime" | |
177 GURL url3 = test_server_.GetURL("files/certs.p7c"); | |
178 StartRequest(url3, callback3, &fetcher); | |
179 | |
180 // Wait for all of the requests to complete. | |
181 scoped_ptr<FetchResult> result1 = callback1.WaitForResult(); | |
182 scoped_ptr<FetchResult> result2 = callback2.WaitForResult(); | |
183 scoped_ptr<FetchResult> result3 = callback3.WaitForResult(); | |
184 | |
185 // Verify the fetch results. | |
186 result1->VerifySuccess("-cert.crt-\n"); | |
187 result2->VerifySuccess("-root.crl-\n"); | |
188 result3->VerifySuccess("-certs.p7c-\n"); | |
189 | |
190 EXPECT_EQ(3, network_delegate_.created_requests()); | |
191 } | |
192 | |
193 // Fetch a caIssuers URL which has an unexpected extension and Content-Type. | |
194 // The extension is .txt and the Content-Type is text/plain. Despite being | |
195 // unusual this succeeds as the extension and Content-Type are not required to | |
196 // be meaningful. | |
197 TEST_F(CertNetFetcherImplTest, ContentTypeDoesntMatter) { | |
198 ASSERT_TRUE(test_server_.Start()); | |
199 | |
200 CertNetFetcherImpl fetcher(&context_); | |
201 | |
202 TestFetchCallback callback; | |
203 GURL url = test_server_.GetURL("files/foo.txt"); | |
204 StartRequest(url, callback, &fetcher); | |
205 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
206 result->VerifySuccess("-foo.txt-\n"); | |
207 } | |
208 | |
209 // Fetch a URLs whose HTTP response code is not 200. These are considered | |
210 // failures. | |
211 TEST_F(CertNetFetcherImplTest, HttpStatusCode) { | |
212 ASSERT_TRUE(test_server_.Start()); | |
213 | |
214 CertNetFetcherImpl fetcher(&context_); | |
215 | |
216 // Response was HTTP status 404. | |
217 { | |
218 TestFetchCallback callback; | |
219 GURL url = test_server_.GetURL("files/404.html"); | |
220 StartRequest(url, callback, &fetcher); | |
221 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
222 result->VerifyFailure(ERR_FAILED); | |
223 } | |
224 | |
225 // Response was HTTP status 500. | |
226 { | |
227 TestFetchCallback callback; | |
228 GURL url = test_server_.GetURL("files/500.html"); | |
229 StartRequest(url, callback, &fetcher); | |
230 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
231 result->VerifyFailure(ERR_FAILED); | |
232 } | |
233 } | |
234 | |
235 // Fetching a URL with a Content-Disposition header should have no effect. | |
236 TEST_F(CertNetFetcherImplTest, ContentDisposition) { | |
237 ASSERT_TRUE(test_server_.Start()); | |
238 | |
239 CertNetFetcherImpl fetcher(&context_); | |
240 | |
241 TestFetchCallback callback; | |
242 GURL url = test_server_.GetURL("files/downloadable.js"); | |
243 StartRequest(url, callback, &fetcher); | |
244 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
245 result->VerifySuccess("-downloadable.js-\n"); | |
246 } | |
247 | |
248 // Verifies that a cachable request will be served from the HTTP cache the | |
249 // second time it is requested. | |
250 TEST_F(CertNetFetcherImplTest, Cache) { | |
251 ASSERT_TRUE(test_server_.Start()); | |
252 | |
253 CertNetFetcherImpl fetcher(&context_); | |
254 | |
255 // Fetch a URL whose HTTP headers make it cacheable for 1 hour. | |
256 GURL url(test_server_.GetURL("files/cacheable_1hr.crt")); | |
257 { | |
258 TestFetchCallback callback; | |
259 StartRequest(url, callback, &fetcher); | |
260 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
261 result->VerifySuccess("-cacheable_1hr.crt-\n"); | |
262 } | |
263 | |
264 EXPECT_EQ(1, network_delegate_.created_requests()); | |
265 | |
266 // Kill the HTTP server. | |
267 ASSERT_TRUE(test_server_.Stop()); | |
268 | |
269 // Fetch again -- will fail unless served from cache. | |
270 { | |
271 TestFetchCallback callback; | |
272 StartRequest(url, callback, &fetcher); | |
273 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
274 result->VerifySuccess("-cacheable_1hr.crt-\n"); | |
275 } | |
276 | |
277 EXPECT_EQ(2, network_delegate_.created_requests()); | |
278 } | |
279 | |
280 // Verify that the maximum response body constraints are enforced by fetching a | |
281 // resource that is larger than the limit. | |
282 TEST_F(CertNetFetcherImplTest, TooLarge) { | |
283 ASSERT_TRUE(test_server_.Start()); | |
284 | |
285 CertNetFetcherImpl fetcher(&context_); | |
286 | |
287 // This file has a response body 12 bytes long. So setting the maximum to 11 | |
288 // bytes will cause it to fail. | |
289 GURL url(test_server_.GetURL("files/certs.p7c")); | |
290 TestFetchCallback callback; | |
291 fetcher.FetchCaIssuers(url, CertNetFetcher::DEFAULT, 11, callback.callback()); | |
292 | |
293 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
294 result->VerifyFailure(ERR_FILE_TOO_BIG); | |
295 } | |
296 | |
297 // Set the timeout to 10 milliseconds, and try fetching a URL that takes 5 | |
298 // seconds to complete. It should fail due to a timeout. | |
299 TEST_F(CertNetFetcherImplTest, Hang) { | |
300 ASSERT_TRUE(test_server_.Start()); | |
301 | |
302 CertNetFetcherImpl fetcher(&context_); | |
303 | |
304 GURL url(test_server_.GetURL("slow/certs.p7c?5.1")); | |
davidben
2015/03/31 20:52:25
Why 5.1? The comment says 5.
(I think 5.1 doesn't
eroman
2015/04/04 21:57:15
Changed all the floating points to integers.
I ha
| |
305 TestFetchCallback callback; | |
306 fetcher.FetchCaIssuers(url, 10, CertNetFetcher::DEFAULT, callback.callback()); | |
307 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
308 result->VerifyFailure(ERR_TIMED_OUT); | |
309 } | |
310 | |
311 // Verify that if a response is gzip-encoded it gets inflated before being | |
312 // returned to the caller. | |
313 TEST_F(CertNetFetcherImplTest, Gzip) { | |
314 ASSERT_TRUE(test_server_.Start()); | |
315 | |
316 CertNetFetcherImpl fetcher(&context_); | |
317 | |
318 GURL url(test_server_.GetURL("files/gzipped_crl")); | |
319 TestFetchCallback callback; | |
320 StartRequest(url, callback, &fetcher); | |
321 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
322 result->VerifySuccess("-gzipped_crl-\n"); | |
323 } | |
324 | |
325 // Try fetching an unsupported URL scheme (https). | |
326 TEST_F(CertNetFetcherImplTest, HttpsNotAllowed) { | |
327 ASSERT_TRUE(test_server_.Start()); | |
328 | |
329 CertNetFetcherImpl fetcher(&context_); | |
330 | |
331 GURL url("https://foopy/foo.crt"); | |
332 TestFetchCallback callback; | |
333 StartRequest(url, callback, &fetcher); | |
334 // Should NOT complete synchronously despite being a test that could be done | |
335 // immediately. | |
336 EXPECT_FALSE(callback.HasResult()); | |
337 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
338 result->VerifyFailure(ERR_DISALLOWED_URL_SCHEME); | |
339 | |
340 // No request was created because the URL scheme was unsupported. | |
341 EXPECT_EQ(0, network_delegate_.created_requests()); | |
342 } | |
343 | |
344 // Try fetching a URL which redirects to https. | |
345 TEST_F(CertNetFetcherImplTest, RedirectToHttpsNotAllowed) { | |
346 ASSERT_TRUE(test_server_.Start()); | |
347 | |
348 CertNetFetcherImpl fetcher(&context_); | |
349 | |
350 GURL url(test_server_.GetURL("files/redirect_https")); | |
351 TestFetchCallback callback; | |
352 StartRequest(url, callback, &fetcher); | |
353 scoped_ptr<FetchResult> result = callback.WaitForResult(); | |
354 result->VerifyFailure(ERR_DISALLOWED_URL_SCHEME); | |
355 | |
356 EXPECT_EQ(1, network_delegate_.created_requests()); | |
357 } | |
358 | |
359 // Try fetching an unsupported URL scheme (https) and then immediately | |
360 // cancelling. This is a bit special because this codepath needs to post a task. | |
361 TEST_F(CertNetFetcherImplTest, CancelHttpsNotAllowed) { | |
362 ASSERT_TRUE(test_server_.Start()); | |
363 | |
364 CertNetFetcherImpl fetcher(&context_); | |
365 | |
366 GURL url("https://foopy/foo.crt"); | |
367 TestFetchCallback callback; | |
368 CertNetFetcher::RequestId id = StartRequest(url, callback, &fetcher); | |
369 | |
370 // Should NOT complete synchronously despite being a test that could be done | |
371 // immediately. | |
372 EXPECT_FALSE(callback.HasResult()); | |
373 | |
374 EXPECT_EQ(0, network_delegate_.created_requests()); | |
375 fetcher.CancelRequest(id); | |
davidben
2015/03/31 20:52:24
This probably wants a RunUntilIdle and still asser
eroman
2015/04/04 21:57:15
Done.
| |
376 } | |
377 | |
378 // Start a few requests, and cancel one of them before running the message loop | |
379 // again. | |
380 TEST_F(CertNetFetcherImplTest, CancelBeforeRunningMessageLoop) { | |
381 ASSERT_TRUE(test_server_.Start()); | |
382 | |
383 CertNetFetcherImpl fetcher(&context_); | |
384 TestFetchCallback callback1; | |
385 TestFetchCallback callback2; | |
386 TestFetchCallback callback3; | |
387 | |
388 GURL url1 = test_server_.GetURL("files/cert.crt"); | |
389 StartRequest(url1, callback1, &fetcher); | |
390 | |
391 GURL url2 = test_server_.GetURL("files/root.crl"); | |
392 CertNetFetcher::RequestId id2 = StartRequest(url2, callback2, &fetcher); | |
393 | |
394 GURL url3 = test_server_.GetURL("files/certs.p7c"); | |
395 StartRequest(url3, callback3, &fetcher); | |
396 | |
397 EXPECT_EQ(3, network_delegate_.created_requests()); | |
398 EXPECT_FALSE(callback1.HasResult()); | |
399 EXPECT_FALSE(callback2.HasResult()); | |
400 EXPECT_FALSE(callback3.HasResult()); | |
401 | |
402 // Cancel the second request. | |
403 fetcher.CancelRequest(id2); | |
404 | |
405 // Wait for the non-cancelled requests to complete. | |
406 scoped_ptr<FetchResult> result1 = callback1.WaitForResult(); | |
407 scoped_ptr<FetchResult> result3 = callback3.WaitForResult(); | |
408 | |
409 // Verify the fetch results. | |
410 result1->VerifySuccess("-cert.crt-\n"); | |
411 result3->VerifySuccess("-certs.p7c-\n"); | |
412 | |
413 EXPECT_FALSE(callback2.HasResult()); | |
414 } | |
415 | |
416 // Start several requests, and cancel one of them after the first has completed. | |
417 // NOTE: The python test server is single threaded and can only service one | |
418 // request at a time. After a socket is opened by the server it waits for it to | |
419 // be completed, and any subsequent request will hang until the first socket is | |
420 // closed. | |
421 // Cancelling the first request can therefore be problematic, since if | |
422 // cancellation is done after the socket is opened but before reading/writing, | |
423 // then the socket is re-cycled and things will be stalled until the cleanup | |
424 // timer (10 seconds) closes it. | |
425 // To work around this, the last request is cancelled, and hope that the | |
426 // requests are given opened sockets in a FIFO order. | |
davidben
2015/03/31 20:52:25
Perhaps if we configured the socket pool allow a m
eroman
2015/04/04 21:57:15
I took a quick look on how to configure that and d
| |
427 TEST_F(CertNetFetcherImplTest, CancelAfterRunningMessageLoop) { | |
428 ASSERT_TRUE(test_server_.Start()); | |
429 | |
430 CertNetFetcherImpl fetcher(&context_); | |
431 TestFetchCallback callback1; | |
432 TestFetchCallback callback2; | |
433 TestFetchCallback callback3; | |
434 | |
435 GURL url1 = test_server_.GetURL("files/cert.crt"); | |
436 StartRequest(url1, callback1, &fetcher); | |
437 | |
438 GURL url2 = test_server_.GetURL("files/certs.p7c"); | |
439 CertNetFetcher::RequestId id2 = StartRequest(url2, callback2, &fetcher); | |
440 | |
441 GURL url3("ftp://www.not.supported.com/foo"); | |
442 StartRequest(url3, callback3, &fetcher); | |
443 | |
444 EXPECT_FALSE(callback1.HasResult()); | |
445 EXPECT_FALSE(callback2.HasResult()); | |
446 EXPECT_FALSE(callback3.HasResult()); | |
447 | |
448 // Wait for the fast request to complete. | |
davidben
2015/03/31 20:52:23
fast -> last?
eroman
2015/04/04 21:57:15
Fast was intentional -- The last request is for an
| |
449 scoped_ptr<FetchResult> result3 = callback3.WaitForResult(); | |
450 result3->VerifyFailure(ERR_DISALLOWED_URL_SCHEME); | |
451 | |
452 // Cancel the second outstanding request. | |
453 fetcher.CancelRequest(id2); | |
davidben
2015/03/31 20:52:24
This assumes that callback2 hasn't fired yet. (Rea
eroman
2015/04/04 21:57:15
With the new scoped_ptr<Request> approach this is
| |
454 | |
455 // Wait for the first request to complete. | |
456 scoped_ptr<FetchResult> result2 = callback1.WaitForResult(); | |
457 | |
458 // Verify the fetch results. | |
459 result2->VerifySuccess("-cert.crt-\n"); | |
460 } | |
461 | |
462 // Delete a CertNetFetcherImpl with outstanding requests on it. | |
463 TEST_F(CertNetFetcherImplTest, DeleteCancels) { | |
464 ASSERT_TRUE(test_server_.Start()); | |
465 | |
466 CertNetFetcherImpl fetcher(&context_); | |
467 | |
468 GURL url(test_server_.GetURL("slow/certs.p7c?20.1")); | |
davidben
2015/03/31 20:52:26
Why 20.1 instead of 20?
eroman
2015/04/04 21:57:15
Done.
| |
469 TestFetchCallback callback; | |
470 StartRequest(url, callback, &fetcher); | |
471 | |
472 // Note that the request is never completed, nor cancelled. | |
473 } | |
474 | |
475 // Fetch the same URLs in parallel and verify that only 1 request is made per | |
476 // URL. | |
477 TEST_F(CertNetFetcherImplTest, ParallelFetchDupes) { | |
davidben
2015/03/31 20:52:25
Nit: Dupes is a strange word. Duplicates? :-)
eroman
2015/04/04 21:57:15
Done.
| |
478 ASSERT_TRUE(test_server_.Start()); | |
479 | |
480 CertNetFetcherImpl fetcher(&context_); | |
481 | |
482 GURL url1 = test_server_.GetURL("files/cert.crt"); | |
483 GURL url2 = test_server_.GetURL("files/root.crl"); | |
484 | |
485 // Issue 3 requests for url1, and 3 requests for url2 | |
486 TestFetchCallback callback1; | |
487 CertNetFetcher::RequestId request1 = StartRequest(url1, callback1, &fetcher); | |
488 | |
489 TestFetchCallback callback2; | |
490 StartRequest(url2, callback2, &fetcher); | |
491 | |
492 TestFetchCallback callback3; | |
493 CertNetFetcher::RequestId request3 = StartRequest(url1, callback3, &fetcher); | |
494 | |
495 TestFetchCallback callback4; | |
496 StartRequest(url2, callback4, &fetcher); | |
497 | |
498 TestFetchCallback callback5; | |
499 StartRequest(url2, callback5, &fetcher); | |
500 | |
501 TestFetchCallback callback6; | |
502 StartRequest(url1, callback6, &fetcher); | |
503 | |
504 // Cancel all but one of the requests for url1. | |
505 fetcher.CancelRequest(request1); | |
506 fetcher.CancelRequest(request3); | |
507 | |
508 // Wait for the remaining requests to finish. | |
509 scoped_ptr<FetchResult> result2 = callback2.WaitForResult(); | |
510 scoped_ptr<FetchResult> result4 = callback4.WaitForResult(); | |
511 scoped_ptr<FetchResult> result5 = callback5.WaitForResult(); | |
512 scoped_ptr<FetchResult> result6 = callback6.WaitForResult(); | |
513 | |
514 // Verify that none of the cancelled requests for url1 completed (since they | |
515 // were cancelled). | |
516 EXPECT_FALSE(callback1.HasResult()); | |
517 EXPECT_FALSE(callback3.HasResult()); | |
518 | |
519 // Verify the fetch results. | |
520 result2->VerifySuccess("-root.crl-\n"); | |
521 result4->VerifySuccess("-root.crl-\n"); | |
522 result5->VerifySuccess("-root.crl-\n"); | |
523 result6->VerifySuccess("-cert.crt-\n"); | |
524 | |
525 // Verify that only 2 URLRequests were started even though 6 requests were | |
526 // issued. | |
527 EXPECT_EQ(2, network_delegate_.created_requests()); | |
528 } | |
529 | |
530 // Cancel a request and then start another one for the same URL. | |
531 TEST_F(CertNetFetcherImplTest, CancelThenStart) { | |
532 ASSERT_TRUE(test_server_.Start()); | |
533 | |
534 CertNetFetcherImpl fetcher(&context_); | |
535 TestFetchCallback callback1; | |
536 CertNetFetcher::RequestId request1; | |
537 | |
538 TestFetchCallback callback2; | |
539 CertNetFetcher::RequestId request2; | |
540 | |
541 TestFetchCallback callback3; | |
542 CertNetFetcher::RequestId request3; | |
543 | |
544 GURL url = test_server_.GetURL("files/cert.crt"); | |
545 | |
546 request1 = StartRequest(url, callback1, &fetcher); | |
547 fetcher.CancelRequest(request1); | |
548 | |
549 request2 = StartRequest(url, callback2, &fetcher); | |
550 | |
551 request3 = StartRequest(url, callback3, &fetcher); | |
552 fetcher.CancelRequest(request3); | |
553 | |
554 // All but |request2| were canceled. | |
555 scoped_ptr<FetchResult> result = callback2.WaitForResult(); | |
556 | |
557 result->VerifySuccess("-cert.crt-\n"); | |
558 | |
559 EXPECT_FALSE(callback1.HasResult()); | |
560 EXPECT_FALSE(callback3.HasResult()); | |
561 | |
562 // One URLRequest that was cancelled, then another right afterwards. | |
563 EXPECT_EQ(2, network_delegate_.created_requests()); | |
564 } | |
565 | |
566 // Start duplicate requests and then cancel all of them. | |
567 TEST_F(CertNetFetcherImplTest, CancelAll) { | |
568 ASSERT_TRUE(test_server_.Start()); | |
569 | |
570 CertNetFetcherImpl fetcher(&context_); | |
571 TestFetchCallback callback[3]; | |
572 CertNetFetcher::RequestId request[3]; | |
573 | |
574 GURL url = test_server_.GetURL("files/cert.crt"); | |
575 | |
576 for (size_t i = 0; i < arraysize(callback); ++i) { | |
577 request[i] = StartRequest(url, callback[i], &fetcher); | |
578 } | |
davidben
2015/03/31 20:52:25
Nit: This line has curlies while the rest don't.
eroman
2015/04/04 21:57:15
Done.
| |
579 | |
580 for (size_t i = 0; i < arraysize(request); ++i) | |
581 fetcher.CancelRequest(request[i]); | |
582 | |
583 EXPECT_EQ(1, network_delegate_.created_requests()); | |
584 | |
585 for (size_t i = 0; i < arraysize(request); ++i) | |
586 EXPECT_FALSE(callback[i].HasResult()); | |
587 } | |
588 | |
589 void DeleteCertNetFetcher(CertNetFetcher* fetcher) { | |
590 delete fetcher; | |
591 } | |
592 | |
593 // Delete the CertNetFetcherImpl within a request callback. | |
594 TEST_F(CertNetFetcherImplTest, DeleteWithinCallback) { | |
595 ASSERT_TRUE(test_server_.Start()); | |
596 | |
597 // Deleted by callback2. | |
598 CertNetFetcher* fetcher = new CertNetFetcherImpl(&context_); | |
599 | |
600 GURL url = test_server_.GetURL("files/cert.crt"); | |
601 | |
602 TestFetchCallback callback[4]; | |
603 callback[1].set_extra_closure(base::Bind(DeleteCertNetFetcher, fetcher)); | |
604 | |
605 for (size_t i = 0; i < arraysize(callback); ++i) | |
606 StartRequest(url, callback[i], fetcher); | |
607 | |
608 EXPECT_EQ(1, network_delegate_.created_requests()); | |
609 | |
610 callback[1].WaitForResult(); | |
611 | |
612 // Assume requests for the same URL are executed in FIFO order. | |
613 EXPECT_TRUE(callback[0].HasResult()); | |
614 EXPECT_FALSE(callback[2].HasResult()); | |
615 EXPECT_FALSE(callback[3].HasResult()); | |
616 } | |
617 | |
618 void FetchRequest(CertNetFetcher* fetcher, | |
619 const GURL& url, | |
620 TestFetchCallback* callback) { | |
621 StartRequest(url, *callback, fetcher); | |
622 } | |
623 | |
624 // Make a request during callback for the same URL. | |
625 TEST_F(CertNetFetcherImplTest, FetchWithinCallback) { | |
626 ASSERT_TRUE(test_server_.Start()); | |
627 | |
628 CertNetFetcherImpl fetcher(&context_); | |
629 | |
630 GURL url = test_server_.GetURL("files/cert.crt"); | |
631 | |
632 TestFetchCallback callback[5]; | |
633 callback[1].set_extra_closure( | |
634 base::Bind(FetchRequest, &fetcher, url, &callback[4])); | |
635 | |
636 for (size_t i = 0; i < arraysize(callback) - 1; ++i) | |
637 StartRequest(url, callback[i], &fetcher); | |
638 | |
639 EXPECT_EQ(1, network_delegate_.created_requests()); | |
640 | |
641 for (size_t i = 0; i < arraysize(callback); ++i) { | |
642 scoped_ptr<FetchResult> result = callback[i].WaitForResult(); | |
643 result->VerifySuccess("-cert.crt-\n"); | |
644 } | |
645 | |
646 // The fetch started within a callback should have started a new request | |
647 // rather than attaching to the current job. | |
648 EXPECT_EQ(2, network_delegate_.created_requests()); | |
649 } | |
650 | |
651 void CancelRequest(CertNetFetcher* fetcher, CertNetFetcher::RequestId request) { | |
652 fetcher->CancelRequest(request); | |
653 } | |
654 | |
655 // Cancel a request while executing a callback for the same job. | |
656 TEST_F(CertNetFetcherImplTest, CancelWithinCallback) { | |
657 ASSERT_TRUE(test_server_.Start()); | |
658 | |
659 CertNetFetcherImpl fetcher(&context_); | |
660 | |
661 GURL url = test_server_.GetURL("files/cert.crt"); | |
662 | |
663 TestFetchCallback callback[4]; | |
664 CertNetFetcher::RequestId request[4]; | |
665 | |
666 for (size_t i = 0; i < arraysize(callback); ++i) { | |
667 request[i] = StartRequest(url, callback[i], &fetcher); | |
668 } | |
669 | |
670 // Cancel request[2] when the callback for request[1] runs. | |
671 callback[1].set_extra_closure( | |
672 base::Bind(CancelRequest, &fetcher, request[2])); | |
673 | |
674 EXPECT_EQ(1, network_delegate_.created_requests()); | |
675 | |
676 for (size_t i = 0; i < arraysize(request); ++i) { | |
677 if (i == 2) | |
678 continue; | |
679 | |
680 scoped_ptr<FetchResult> result = callback[i].WaitForResult(); | |
681 result->VerifySuccess("-cert.crt-\n"); | |
682 } | |
683 | |
684 // request[2] was cancelled. | |
685 EXPECT_FALSE(callback[2].HasResult()); | |
686 } | |
687 | |
688 } // namespace net | |
OLD | NEW |