| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/proxy/proxy_config_service_common_unittest.h" | |
| 6 | |
| 7 #include <string> | |
| 8 #include <vector> | |
| 9 | |
| 10 #include "net/proxy/proxy_config.h" | |
| 11 | |
| 12 #include "testing/gtest/include/gtest/gtest.h" | |
| 13 | |
| 14 namespace net { | |
| 15 | |
| 16 namespace { | |
| 17 | |
| 18 // Helper to verify that |expected_proxy| matches the first proxy conatined in | |
| 19 // |actual_proxies|, and that |actual_proxies| contains exactly one proxy. If | |
| 20 // either condition is untrue, then |*did_fail| is set to true, and | |
| 21 // |*failure_details| is filled with a description of the failure. | |
| 22 void MatchesProxyServerHelper(const char* failure_message, | |
| 23 const char* expected_proxy, | |
| 24 const ProxyList& actual_proxies, | |
| 25 ::testing::AssertionResult* failure_details, | |
| 26 bool* did_fail) { | |
| 27 // If |expected_proxy| is empty, then we expect |actual_proxies| to be so as | |
| 28 // well. | |
| 29 if (strlen(expected_proxy) == 0) { | |
| 30 if (!actual_proxies.IsEmpty()) { | |
| 31 *did_fail = true; | |
| 32 *failure_details | |
| 33 << failure_message << ". Was expecting no proxies but got " | |
| 34 << actual_proxies.size() << "."; | |
| 35 } | |
| 36 return; | |
| 37 } | |
| 38 | |
| 39 // Otherwise we check that |actual_proxies| holds a single matching proxy. | |
| 40 if (actual_proxies.size() != 1) { | |
| 41 *did_fail = true; | |
| 42 *failure_details | |
| 43 << failure_message << ". Was expecting exactly one proxy but got " | |
| 44 << actual_proxies.size() << "."; | |
| 45 return; | |
| 46 } | |
| 47 | |
| 48 ProxyServer actual_proxy = actual_proxies.Get(); | |
| 49 std::string actual_proxy_string; | |
| 50 if (actual_proxy.is_valid()) | |
| 51 actual_proxy_string = actual_proxy.ToURI(); | |
| 52 | |
| 53 if (std::string(expected_proxy) != actual_proxy_string) { | |
| 54 *failure_details | |
| 55 << failure_message << ". Was expecting: \"" << expected_proxy | |
| 56 << "\" but got: \"" << actual_proxy_string << "\""; | |
| 57 *did_fail = true; | |
| 58 } | |
| 59 } | |
| 60 | |
| 61 std::string FlattenProxyBypass(const ProxyBypassRules& bypass_rules) { | |
| 62 std::string flattened_proxy_bypass; | |
| 63 for (ProxyBypassRules::RuleList::const_iterator it = | |
| 64 bypass_rules.rules().begin(); | |
| 65 it != bypass_rules.rules().end(); ++it) { | |
| 66 if (!flattened_proxy_bypass.empty()) | |
| 67 flattened_proxy_bypass += ","; | |
| 68 flattened_proxy_bypass += (*it)->ToString(); | |
| 69 } | |
| 70 return flattened_proxy_bypass; | |
| 71 } | |
| 72 | |
| 73 } // namespace | |
| 74 | |
| 75 ProxyRulesExpectation::ProxyRulesExpectation( | |
| 76 ProxyConfig::ProxyRules::Type type, | |
| 77 const char* single_proxy, | |
| 78 const char* proxy_for_http, | |
| 79 const char* proxy_for_https, | |
| 80 const char* proxy_for_ftp, | |
| 81 const char* fallback_proxy, | |
| 82 const char* flattened_bypass_rules, | |
| 83 bool reverse_bypass) | |
| 84 : type(type), | |
| 85 single_proxy(single_proxy), | |
| 86 proxy_for_http(proxy_for_http), | |
| 87 proxy_for_https(proxy_for_https), | |
| 88 proxy_for_ftp(proxy_for_ftp), | |
| 89 fallback_proxy(fallback_proxy), | |
| 90 flattened_bypass_rules(flattened_bypass_rules), | |
| 91 reverse_bypass(reverse_bypass) { | |
| 92 } | |
| 93 | |
| 94 | |
| 95 ::testing::AssertionResult ProxyRulesExpectation::Matches( | |
| 96 const ProxyConfig::ProxyRules& rules) const { | |
| 97 ::testing::AssertionResult failure_details = ::testing::AssertionFailure(); | |
| 98 bool failed = false; | |
| 99 | |
| 100 if (rules.type != type) { | |
| 101 failure_details << "Type mismatch. Expected: " | |
| 102 << type << " but was: " << rules.type; | |
| 103 failed = true; | |
| 104 } | |
| 105 | |
| 106 MatchesProxyServerHelper("Bad single_proxy", single_proxy, | |
| 107 rules.single_proxies, &failure_details, &failed); | |
| 108 MatchesProxyServerHelper("Bad proxy_for_http", proxy_for_http, | |
| 109 rules.proxies_for_http, &failure_details, | |
| 110 &failed); | |
| 111 MatchesProxyServerHelper("Bad proxy_for_https", proxy_for_https, | |
| 112 rules.proxies_for_https, &failure_details, | |
| 113 &failed); | |
| 114 MatchesProxyServerHelper("Bad fallback_proxy", fallback_proxy, | |
| 115 rules.fallback_proxies, &failure_details, &failed); | |
| 116 | |
| 117 std::string actual_flattened_bypass = FlattenProxyBypass(rules.bypass_rules); | |
| 118 if (std::string(flattened_bypass_rules) != actual_flattened_bypass) { | |
| 119 failure_details | |
| 120 << "Bad bypass rules. Expected: \"" << flattened_bypass_rules | |
| 121 << "\" but got: \"" << actual_flattened_bypass << "\""; | |
| 122 failed = true; | |
| 123 } | |
| 124 | |
| 125 if (rules.reverse_bypass != reverse_bypass) { | |
| 126 failure_details << "Bad reverse_bypass. Expected: " << reverse_bypass | |
| 127 << " but got: " << rules.reverse_bypass; | |
| 128 failed = true; | |
| 129 } | |
| 130 | |
| 131 return failed ? failure_details : ::testing::AssertionSuccess(); | |
| 132 } | |
| 133 | |
| 134 // static | |
| 135 ProxyRulesExpectation ProxyRulesExpectation::Empty() { | |
| 136 return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_NO_RULES, | |
| 137 "", "", "", "", "", "", false); | |
| 138 } | |
| 139 | |
| 140 // static | |
| 141 ProxyRulesExpectation ProxyRulesExpectation::EmptyWithBypass( | |
| 142 const char* flattened_bypass_rules) { | |
| 143 return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_NO_RULES, | |
| 144 "", "", "", "", "", flattened_bypass_rules, | |
| 145 false); | |
| 146 } | |
| 147 | |
| 148 // static | |
| 149 ProxyRulesExpectation ProxyRulesExpectation::Single( | |
| 150 const char* single_proxy, | |
| 151 const char* flattened_bypass_rules) { | |
| 152 return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_SINGLE_PROXY, | |
| 153 single_proxy, "", "", "", "", | |
| 154 flattened_bypass_rules, false); | |
| 155 } | |
| 156 | |
| 157 // static | |
| 158 ProxyRulesExpectation ProxyRulesExpectation::PerScheme( | |
| 159 const char* proxy_http, | |
| 160 const char* proxy_https, | |
| 161 const char* proxy_ftp, | |
| 162 const char* flattened_bypass_rules) { | |
| 163 return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME, | |
| 164 "", proxy_http, proxy_https, proxy_ftp, "", | |
| 165 flattened_bypass_rules, false); | |
| 166 } | |
| 167 | |
| 168 // static | |
| 169 ProxyRulesExpectation ProxyRulesExpectation::PerSchemeWithSocks( | |
| 170 const char* proxy_http, | |
| 171 const char* proxy_https, | |
| 172 const char* proxy_ftp, | |
| 173 const char* socks_proxy, | |
| 174 const char* flattened_bypass_rules) { | |
| 175 return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME, | |
| 176 "", proxy_http, proxy_https, proxy_ftp, | |
| 177 socks_proxy, flattened_bypass_rules, false); | |
| 178 } | |
| 179 | |
| 180 // static | |
| 181 ProxyRulesExpectation ProxyRulesExpectation::PerSchemeWithBypassReversed( | |
| 182 const char* proxy_http, | |
| 183 const char* proxy_https, | |
| 184 const char* proxy_ftp, | |
| 185 const char* flattened_bypass_rules) { | |
| 186 return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME, | |
| 187 "", proxy_http, proxy_https, proxy_ftp, "", | |
| 188 flattened_bypass_rules, true); | |
| 189 } | |
| 190 | |
| 191 } // namespace net | |
| OLD | NEW |