1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "build/build_config.h"
14 #include "base/basictypes.h"
15 #include "base/bind.h"
16 #include "base/compiler_specific.h"
17 #include "base/files/file_util.h"
18 #include "base/files/scoped_temp_dir.h"
19 #include "base/format_macros.h"
20 #include "base/memory/scoped_ptr.h"
21 #include "base/memory/weak_ptr.h"
22 #include "base/message_loop/message_loop.h"
23 #include "base/message_loop/message_loop_proxy.h"
24 #include "base/path_service.h"
25 #include "base/run_loop.h"
26 #include "base/strings/string_number_conversions.h"
27 #include "base/strings/string_piece.h"
28 #include "base/strings/string_split.h"
29 #include "base/strings/string_util.h"
30 #include "base/strings/stringprintf.h"
31 #include "base/strings/utf_string_conversions.h"
32 #include "net/base/capturing_net_log.h"
33 #include "net/base/chunked_upload_data_stream.h"
34 #include "net/base/elements_upload_data_stream.h"
35 #include "net/base/load_flags.h"
36 #include "net/base/load_timing_info.h"
37 #include "net/base/load_timing_info_test_util.h"
38 #include "net/base/net_errors.h"
39 #include "net/base/net_log.h"
40 #include "net/base/net_log_unittest.h"
41 #include "net/base/net_module.h"
42 #include "net/base/net_util.h"
43 #include "net/base/request_priority.h"
44 #include "net/base/test_data_directory.h"
45 #include "net/base/upload_bytes_element_reader.h"
46 #include "net/base/upload_data_stream.h"
47 #include "net/base/upload_file_element_reader.h"
48 #include "net/cert/ev_root_ca_metadata.h"
49 #include "net/cert/mock_cert_verifier.h"
50 #include "net/cert/test_root_certs.h"
51 #include "net/cookies/cookie_monster.h"
52 #include "net/cookies/cookie_store_test_helpers.h"
53 #include "net/disk_cache/disk_cache.h"
54 #include "net/dns/mock_host_resolver.h"
55 #include "net/ftp/ftp_network_layer.h"
56 #include "net/http/http_byte_range.h"
57 #include "net/http/http_cache.h"
58 #include "net/http/http_network_layer.h"
59 #include "net/http/http_network_session.h"
60 #include "net/http/http_request_headers.h"
61 #include "net/http/http_response_headers.h"
62 #include "net/http/http_util.h"
63 #include "net/ocsp/nss_ocsp.h"
64 #include "net/proxy/proxy_service.h"
65 #include "net/socket/ssl_client_socket.h"
66 #include "net/ssl/ssl_cipher_suite_names.h"
67 #include "net/ssl/ssl_connection_status_flags.h"
68 #include "net/test/cert_test_util.h"
69 #include "net/test/spawned_test_server/spawned_test_server.h"
70 #include "net/url_request/data_protocol_handler.h"
71 #include "net/url_request/static_http_user_agent_settings.h"
72 #include "net/url_request/url_request.h"
73 #include "net/url_request/url_request_http_job.h"
74 #include "net/url_request/url_request_intercepting_job_factory.h"
75 #include "net/url_request/url_request_interceptor.h"
76 #include "net/url_request/url_request_job_factory_impl.h"
77 #include "net/url_request/url_request_redirect_job.h"
78 #include "net/url_request/url_request_test_job.h"
79 #include "net/url_request/url_request_test_util.h"
80 #include "testing/gtest/include/gtest/gtest.h"
81 #include "testing/platform_test.h"
83 #if !defined(DISABLE_FILE_SUPPORT)
84 #include "net/base/filename_util.h"
85 #include "net/url_request/file_protocol_handler.h"
86 #include "net/url_request/url_request_file_dir_job.h"
89 #if !defined(DISABLE_FTP_SUPPORT)
90 #include "net/url_request/ftp_protocol_handler.h"
94 #include "base/win/scoped_com_initializer.h"
95 #include "base/win/scoped_comptr.h"
96 #include "base/win/windows_version.h"
99 using base::ASCIIToUTF16
;
107 const base::string16
kChrome(ASCIIToUTF16("chrome"));
108 const base::string16
kSecret(ASCIIToUTF16("secret"));
109 const base::string16
kUser(ASCIIToUTF16("user"));
111 // Tests load timing information in the case a fresh connection was used, with
113 void TestLoadTimingNotReused(const LoadTimingInfo
& load_timing_info
,
114 int connect_timing_flags
) {
115 EXPECT_FALSE(load_timing_info
.socket_reused
);
116 EXPECT_NE(NetLog::Source::kInvalidId
, load_timing_info
.socket_log_id
);
118 EXPECT_FALSE(load_timing_info
.request_start_time
.is_null());
119 EXPECT_FALSE(load_timing_info
.request_start
.is_null());
121 EXPECT_LE(load_timing_info
.request_start
,
122 load_timing_info
.connect_timing
.connect_start
);
123 ExpectConnectTimingHasTimes(load_timing_info
.connect_timing
,
124 connect_timing_flags
);
125 EXPECT_LE(load_timing_info
.connect_timing
.connect_end
,
126 load_timing_info
.send_start
);
127 EXPECT_LE(load_timing_info
.send_start
, load_timing_info
.send_end
);
128 EXPECT_LE(load_timing_info
.send_end
, load_timing_info
.receive_headers_end
);
130 EXPECT_TRUE(load_timing_info
.proxy_resolve_start
.is_null());
131 EXPECT_TRUE(load_timing_info
.proxy_resolve_end
.is_null());
134 // Same as above, but with proxy times.
135 void TestLoadTimingNotReusedWithProxy(
136 const LoadTimingInfo
& load_timing_info
,
137 int connect_timing_flags
) {
138 EXPECT_FALSE(load_timing_info
.socket_reused
);
139 EXPECT_NE(NetLog::Source::kInvalidId
, load_timing_info
.socket_log_id
);
141 EXPECT_FALSE(load_timing_info
.request_start_time
.is_null());
142 EXPECT_FALSE(load_timing_info
.request_start
.is_null());
144 EXPECT_LE(load_timing_info
.request_start
,
145 load_timing_info
.proxy_resolve_start
);
146 EXPECT_LE(load_timing_info
.proxy_resolve_start
,
147 load_timing_info
.proxy_resolve_end
);
148 EXPECT_LE(load_timing_info
.proxy_resolve_end
,
149 load_timing_info
.connect_timing
.connect_start
);
150 ExpectConnectTimingHasTimes(load_timing_info
.connect_timing
,
151 connect_timing_flags
);
152 EXPECT_LE(load_timing_info
.connect_timing
.connect_end
,
153 load_timing_info
.send_start
);
154 EXPECT_LE(load_timing_info
.send_start
, load_timing_info
.send_end
);
155 EXPECT_LE(load_timing_info
.send_end
, load_timing_info
.receive_headers_end
);
158 // Same as above, but with a reused socket and proxy times.
159 void TestLoadTimingReusedWithProxy(
160 const LoadTimingInfo
& load_timing_info
) {
161 EXPECT_TRUE(load_timing_info
.socket_reused
);
162 EXPECT_NE(NetLog::Source::kInvalidId
, load_timing_info
.socket_log_id
);
164 EXPECT_FALSE(load_timing_info
.request_start_time
.is_null());
165 EXPECT_FALSE(load_timing_info
.request_start
.is_null());
167 ExpectConnectTimingHasNoTimes(load_timing_info
.connect_timing
);
169 EXPECT_LE(load_timing_info
.request_start
,
170 load_timing_info
.proxy_resolve_start
);
171 EXPECT_LE(load_timing_info
.proxy_resolve_start
,
172 load_timing_info
.proxy_resolve_end
);
173 EXPECT_LE(load_timing_info
.proxy_resolve_end
,
174 load_timing_info
.send_start
);
175 EXPECT_LE(load_timing_info
.send_start
, load_timing_info
.send_end
);
176 EXPECT_LE(load_timing_info
.send_end
, load_timing_info
.receive_headers_end
);
179 // Tests load timing information in the case of a cache hit, when no cache
180 // validation request was sent over the wire.
181 base::StringPiece
TestNetResourceProvider(int key
) {
185 void FillBuffer(char* buffer
, size_t len
) {
186 static bool called
= false;
189 int seed
= static_cast<int>(Time::Now().ToInternalValue());
193 for (size_t i
= 0; i
< len
; i
++) {
194 buffer
[i
] = static_cast<char>(rand());
201 void TestLoadTimingCacheHitNoNetwork(
202 const LoadTimingInfo
& load_timing_info
) {
203 EXPECT_FALSE(load_timing_info
.socket_reused
);
204 EXPECT_EQ(NetLog::Source::kInvalidId
, load_timing_info
.socket_log_id
);
206 EXPECT_FALSE(load_timing_info
.request_start_time
.is_null());
207 EXPECT_FALSE(load_timing_info
.request_start
.is_null());
209 ExpectConnectTimingHasNoTimes(load_timing_info
.connect_timing
);
210 EXPECT_LE(load_timing_info
.request_start
, load_timing_info
.send_start
);
211 EXPECT_LE(load_timing_info
.send_start
, load_timing_info
.send_end
);
212 EXPECT_LE(load_timing_info
.send_end
, load_timing_info
.receive_headers_end
);
214 EXPECT_TRUE(load_timing_info
.proxy_resolve_start
.is_null());
215 EXPECT_TRUE(load_timing_info
.proxy_resolve_end
.is_null());
218 // Tests load timing in the case that there is no HTTP response. This can be
219 // used to test in the case of errors or non-HTTP requests.
220 void TestLoadTimingNoHttpResponse(
221 const LoadTimingInfo
& load_timing_info
) {
222 EXPECT_FALSE(load_timing_info
.socket_reused
);
223 EXPECT_EQ(NetLog::Source::kInvalidId
, load_timing_info
.socket_log_id
);
225 // Only the request times should be non-null.
226 EXPECT_FALSE(load_timing_info
.request_start_time
.is_null());
227 EXPECT_FALSE(load_timing_info
.request_start
.is_null());
229 ExpectConnectTimingHasNoTimes(load_timing_info
.connect_timing
);
231 EXPECT_TRUE(load_timing_info
.proxy_resolve_start
.is_null());
232 EXPECT_TRUE(load_timing_info
.proxy_resolve_end
.is_null());
233 EXPECT_TRUE(load_timing_info
.send_start
.is_null());
234 EXPECT_TRUE(load_timing_info
.send_end
.is_null());
235 EXPECT_TRUE(load_timing_info
.receive_headers_end
.is_null());
238 // Do a case-insensitive search through |haystack| for |needle|.
239 bool ContainsString(const std::string
& haystack
, const char* needle
) {
240 std::string::const_iterator it
=
241 std::search(haystack
.begin(),
244 needle
+ strlen(needle
),
245 base::CaseInsensitiveCompare
<char>());
246 return it
!= haystack
.end();
249 scoped_ptr
<UploadDataStream
> CreateSimpleUploadData(const char* data
) {
250 scoped_ptr
<UploadElementReader
> reader(
251 new UploadBytesElementReader(data
, strlen(data
)));
252 return ElementsUploadDataStream::CreateWithReader(reader
.Pass(), 0);
255 // Verify that the SSLInfo of a successful SSL connection has valid values.
256 void CheckSSLInfo(const SSLInfo
& ssl_info
) {
257 // -1 means unknown. 0 means no encryption.
258 EXPECT_GT(ssl_info
.security_bits
, 0);
260 // The cipher suite TLS_NULL_WITH_NULL_NULL (0) must not be negotiated.
261 uint16 cipher_suite
= SSLConnectionStatusToCipherSuite(
262 ssl_info
.connection_status
);
263 EXPECT_NE(0U, cipher_suite
);
266 void CheckFullRequestHeaders(const HttpRequestHeaders
& headers
,
267 const GURL
& host_url
) {
268 std::string sent_value
;
270 EXPECT_TRUE(headers
.GetHeader("Host", &sent_value
));
271 EXPECT_EQ(GetHostAndOptionalPort(host_url
), sent_value
);
273 EXPECT_TRUE(headers
.GetHeader("Connection", &sent_value
));
274 EXPECT_EQ("keep-alive", sent_value
);
277 bool FingerprintsEqual(const HashValueVector
& a
, const HashValueVector
& b
) {
278 size_t size
= a
.size();
280 if (size
!= b
.size())
283 for (size_t i
= 0; i
< size
; ++i
) {
284 if (!a
[i
].Equals(b
[i
]))
290 #endif // !defined(OS_IOS)
292 // A network delegate that allows the user to choose a subset of request stages
293 // to block in. When blocking, the delegate can do one of the following:
294 // * synchronously return a pre-specified error code, or
295 // * asynchronously return that value via an automatically called callback,
297 // * block and wait for the user to do a callback.
298 // Additionally, the user may also specify a redirect URL -- then each request
299 // with the current URL different from the redirect target will be redirected
300 // to that target, in the on-before-URL-request stage, independent of whether
301 // the delegate blocks in ON_BEFORE_URL_REQUEST or not.
302 class BlockingNetworkDelegate
: public TestNetworkDelegate
{
304 // Stages in which the delegate can block.
307 ON_BEFORE_URL_REQUEST
= 1 << 0,
308 ON_BEFORE_SEND_HEADERS
= 1 << 1,
309 ON_HEADERS_RECEIVED
= 1 << 2,
310 ON_AUTH_REQUIRED
= 1 << 3
313 // Behavior during blocked stages. During other stages, just
314 // returns OK or NetworkDelegate::AUTH_REQUIRED_RESPONSE_NO_ACTION.
316 SYNCHRONOUS
, // No callback, returns specified return values.
317 AUTO_CALLBACK
, // |this| posts a task to run the callback using the
318 // specified return codes.
319 USER_CALLBACK
, // User takes care of doing a callback. |retval_| and
320 // |auth_retval_| are ignored. In every blocking stage the
321 // message loop is quit.
324 // Creates a delegate which does not block at all.
325 explicit BlockingNetworkDelegate(BlockMode block_mode
);
327 // For users to trigger a callback returning |response|.
328 // Side-effects: resets |stage_blocked_for_callback_| and stored callbacks.
329 // Only call if |block_mode_| == USER_CALLBACK.
330 void DoCallback(int response
);
331 void DoAuthCallback(NetworkDelegate::AuthRequiredResponse response
);
334 void set_retval(int retval
) {
335 ASSERT_NE(USER_CALLBACK
, block_mode_
);
336 ASSERT_NE(ERR_IO_PENDING
, retval
);
337 ASSERT_NE(OK
, retval
);
341 // If |auth_retval| == AUTH_REQUIRED_RESPONSE_SET_AUTH, then
342 // |auth_credentials_| will be passed with the response.
343 void set_auth_retval(AuthRequiredResponse auth_retval
) {
344 ASSERT_NE(USER_CALLBACK
, block_mode_
);
345 ASSERT_NE(AUTH_REQUIRED_RESPONSE_IO_PENDING
, auth_retval
);
346 auth_retval_
= auth_retval
;
348 void set_auth_credentials(const AuthCredentials
& auth_credentials
) {
349 auth_credentials_
= auth_credentials
;
352 void set_redirect_url(const GURL
& url
) {
356 void set_block_on(int block_on
) {
357 block_on_
= block_on
;
360 // Allows the user to check in which state did we block.
361 Stage
stage_blocked_for_callback() const {
362 EXPECT_EQ(USER_CALLBACK
, block_mode_
);
363 return stage_blocked_for_callback_
;
367 void RunCallback(int response
, const CompletionCallback
& callback
);
368 void RunAuthCallback(AuthRequiredResponse response
,
369 const AuthCallback
& callback
);
371 // TestNetworkDelegate implementation.
372 int OnBeforeURLRequest(URLRequest
* request
,
373 const CompletionCallback
& callback
,
374 GURL
* new_url
) override
;
376 int OnBeforeSendHeaders(URLRequest
* request
,
377 const CompletionCallback
& callback
,
378 HttpRequestHeaders
* headers
) override
;
380 int OnHeadersReceived(
382 const CompletionCallback
& callback
,
383 const HttpResponseHeaders
* original_response_headers
,
384 scoped_refptr
<HttpResponseHeaders
>* override_response_headers
,
385 GURL
* allowed_unsafe_redirect_url
) override
;
387 NetworkDelegate::AuthRequiredResponse
OnAuthRequired(
389 const AuthChallengeInfo
& auth_info
,
390 const AuthCallback
& callback
,
391 AuthCredentials
* credentials
) override
;
393 // Resets the callbacks and |stage_blocked_for_callback_|.
396 // Checks whether we should block in |stage|. If yes, returns an error code
397 // and optionally sets up callback based on |block_mode_|. If no, returns OK.
398 int MaybeBlockStage(Stage stage
, const CompletionCallback
& callback
);
400 // Configuration parameters, can be adjusted by public methods:
401 const BlockMode block_mode_
;
403 // Values returned on blocking stages when mode is SYNCHRONOUS or
404 // AUTO_CALLBACK. For USER_CALLBACK these are set automatically to IO_PENDING.
405 int retval_
; // To be returned in non-auth stages.
406 AuthRequiredResponse auth_retval_
;
408 GURL redirect_url_
; // Used if non-empty during OnBeforeURLRequest.
409 int block_on_
; // Bit mask: in which stages to block.
411 // |auth_credentials_| will be copied to |*target_auth_credential_| on
413 AuthCredentials auth_credentials_
;
414 AuthCredentials
* target_auth_credentials_
;
416 // Internal variables, not set by not the user:
417 // Last blocked stage waiting for user callback (unused if |block_mode_| !=
419 Stage stage_blocked_for_callback_
;
421 // Callback objects stored during blocking stages.
422 CompletionCallback callback_
;
423 AuthCallback auth_callback_
;
425 base::WeakPtrFactory
<BlockingNetworkDelegate
> weak_factory_
;
427 DISALLOW_COPY_AND_ASSIGN(BlockingNetworkDelegate
);
430 BlockingNetworkDelegate::BlockingNetworkDelegate(BlockMode block_mode
)
431 : block_mode_(block_mode
),
433 auth_retval_(AUTH_REQUIRED_RESPONSE_NO_ACTION
),
435 target_auth_credentials_(NULL
),
436 stage_blocked_for_callback_(NOT_BLOCKED
),
437 weak_factory_(this) {
440 void BlockingNetworkDelegate::DoCallback(int response
) {
441 ASSERT_EQ(USER_CALLBACK
, block_mode_
);
442 ASSERT_NE(NOT_BLOCKED
, stage_blocked_for_callback_
);
443 ASSERT_NE(ON_AUTH_REQUIRED
, stage_blocked_for_callback_
);
444 CompletionCallback callback
= callback_
;
446 RunCallback(response
, callback
);
449 void BlockingNetworkDelegate::DoAuthCallback(
450 NetworkDelegate::AuthRequiredResponse response
) {
451 ASSERT_EQ(USER_CALLBACK
, block_mode_
);
452 ASSERT_EQ(ON_AUTH_REQUIRED
, stage_blocked_for_callback_
);
453 AuthCallback auth_callback
= auth_callback_
;
455 RunAuthCallback(response
, auth_callback
);
458 void BlockingNetworkDelegate::RunCallback(int response
,
459 const CompletionCallback
& callback
) {
460 callback
.Run(response
);
463 void BlockingNetworkDelegate::RunAuthCallback(AuthRequiredResponse response
,
464 const AuthCallback
& callback
) {
465 if (auth_retval_
== AUTH_REQUIRED_RESPONSE_SET_AUTH
) {
466 ASSERT_TRUE(target_auth_credentials_
!= NULL
);
467 *target_auth_credentials_
= auth_credentials_
;
469 callback
.Run(response
);
472 int BlockingNetworkDelegate::OnBeforeURLRequest(
474 const CompletionCallback
& callback
,
476 if (redirect_url_
== request
->url())
477 return OK
; // We've already seen this request and redirected elsewhere.
479 TestNetworkDelegate::OnBeforeURLRequest(request
, callback
, new_url
);
481 if (!redirect_url_
.is_empty())
482 *new_url
= redirect_url_
;
484 return MaybeBlockStage(ON_BEFORE_URL_REQUEST
, callback
);
487 int BlockingNetworkDelegate::OnBeforeSendHeaders(
489 const CompletionCallback
& callback
,
490 HttpRequestHeaders
* headers
) {
491 TestNetworkDelegate::OnBeforeSendHeaders(request
, callback
, headers
);
493 return MaybeBlockStage(ON_BEFORE_SEND_HEADERS
, callback
);
496 int BlockingNetworkDelegate::OnHeadersReceived(
498 const CompletionCallback
& callback
,
499 const HttpResponseHeaders
* original_response_headers
,
500 scoped_refptr
<HttpResponseHeaders
>* override_response_headers
,
501 GURL
* allowed_unsafe_redirect_url
) {
502 TestNetworkDelegate::OnHeadersReceived(request
,
504 original_response_headers
,
505 override_response_headers
,
506 allowed_unsafe_redirect_url
);
508 return MaybeBlockStage(ON_HEADERS_RECEIVED
, callback
);
511 NetworkDelegate::AuthRequiredResponse
BlockingNetworkDelegate::OnAuthRequired(
513 const AuthChallengeInfo
& auth_info
,
514 const AuthCallback
& callback
,
515 AuthCredentials
* credentials
) {
516 TestNetworkDelegate::OnAuthRequired(request
, auth_info
, callback
,
518 // Check that the user has provided callback for the previous blocked stage.
519 EXPECT_EQ(NOT_BLOCKED
, stage_blocked_for_callback_
);
521 if ((block_on_
& ON_AUTH_REQUIRED
) == 0) {
522 return AUTH_REQUIRED_RESPONSE_NO_ACTION
;
525 target_auth_credentials_
= credentials
;
527 switch (block_mode_
) {
529 if (auth_retval_
== AUTH_REQUIRED_RESPONSE_SET_AUTH
)
530 *target_auth_credentials_
= auth_credentials_
;
534 base::MessageLoop::current()->PostTask(
536 base::Bind(&BlockingNetworkDelegate::RunAuthCallback
,
537 weak_factory_
.GetWeakPtr(), auth_retval_
, callback
));
538 return AUTH_REQUIRED_RESPONSE_IO_PENDING
;
541 auth_callback_
= callback
;
542 stage_blocked_for_callback_
= ON_AUTH_REQUIRED
;
543 base::MessageLoop::current()->PostTask(FROM_HERE
,
544 base::MessageLoop::QuitClosure());
545 return AUTH_REQUIRED_RESPONSE_IO_PENDING
;
548 return AUTH_REQUIRED_RESPONSE_NO_ACTION
; // Dummy value.
551 void BlockingNetworkDelegate::Reset() {
552 EXPECT_NE(NOT_BLOCKED
, stage_blocked_for_callback_
);
553 stage_blocked_for_callback_
= NOT_BLOCKED
;
555 auth_callback_
.Reset();
558 int BlockingNetworkDelegate::MaybeBlockStage(
559 BlockingNetworkDelegate::Stage stage
,
560 const CompletionCallback
& callback
) {
561 // Check that the user has provided callback for the previous blocked stage.
562 EXPECT_EQ(NOT_BLOCKED
, stage_blocked_for_callback_
);
564 if ((block_on_
& stage
) == 0) {
568 switch (block_mode_
) {
570 EXPECT_NE(OK
, retval_
);
574 base::MessageLoop::current()->PostTask(
576 base::Bind(&BlockingNetworkDelegate::RunCallback
,
577 weak_factory_
.GetWeakPtr(), retval_
, callback
));
578 return ERR_IO_PENDING
;
581 callback_
= callback
;
582 stage_blocked_for_callback_
= stage
;
583 base::MessageLoop::current()->PostTask(FROM_HERE
,
584 base::MessageLoop::QuitClosure());
585 return ERR_IO_PENDING
;
591 class TestURLRequestContextWithProxy
: public TestURLRequestContext
{
593 // Does not own |delegate|.
594 TestURLRequestContextWithProxy(const std::string
& proxy
,
595 NetworkDelegate
* delegate
)
596 : TestURLRequestContext(true) {
597 context_storage_
.set_proxy_service(ProxyService::CreateFixed(proxy
));
598 set_network_delegate(delegate
);
601 ~TestURLRequestContextWithProxy() override
{}
606 // Inherit PlatformTest since we require the autorelease pool on Mac OS X.
607 class URLRequestTest
: public PlatformTest
{
609 URLRequestTest() : default_context_(true) {
610 default_context_
.set_network_delegate(&default_network_delegate_
);
611 default_context_
.set_net_log(&net_log_
);
612 job_factory_impl_
= new URLRequestJobFactoryImpl();
613 job_factory_
.reset(job_factory_impl_
);
616 ~URLRequestTest() override
{
617 // URLRequestJobs may post clean-up tasks on destruction.
618 base::RunLoop().RunUntilIdle();
621 void SetUp() override
{
623 default_context_
.set_job_factory(job_factory_
.get());
624 default_context_
.Init();
625 PlatformTest::SetUp();
628 virtual void SetUpFactory() {
629 job_factory_impl_
->SetProtocolHandler("data", new DataProtocolHandler
);
630 #if !defined(DISABLE_FILE_SUPPORT)
631 job_factory_impl_
->SetProtocolHandler(
632 "file", new FileProtocolHandler(base::MessageLoopProxy::current()));
636 TestNetworkDelegate
* default_network_delegate() {
637 return &default_network_delegate_
;
640 const TestURLRequestContext
& default_context() const {
641 return default_context_
;
645 // Adds the TestJobInterceptor to the default context.
646 TestJobInterceptor
* AddTestInterceptor() {
647 TestJobInterceptor
* protocol_handler_
= new TestJobInterceptor();
648 job_factory_impl_
->SetProtocolHandler("http", NULL
);
649 job_factory_impl_
->SetProtocolHandler("http", protocol_handler_
);
650 return protocol_handler_
;
654 CapturingNetLog net_log_
;
655 TestNetworkDelegate default_network_delegate_
; // Must outlive URLRequest.
656 URLRequestJobFactoryImpl
* job_factory_impl_
;
657 scoped_ptr
<URLRequestJobFactory
> job_factory_
;
658 TestURLRequestContext default_context_
;
661 TEST_F(URLRequestTest
, AboutBlankTest
) {
664 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
665 GURL("about:blank"), DEFAULT_PRIORITY
, &d
, NULL
));
668 EXPECT_TRUE(r
->is_pending());
670 base::RunLoop().Run();
672 EXPECT_TRUE(!r
->is_pending());
673 EXPECT_FALSE(d
.received_data_before_response());
674 EXPECT_EQ(d
.bytes_received(), 0);
675 EXPECT_EQ("", r
->GetSocketAddress().host());
676 EXPECT_EQ(0, r
->GetSocketAddress().port());
678 HttpRequestHeaders headers
;
679 EXPECT_FALSE(r
->GetFullRequestHeaders(&headers
));
683 TEST_F(URLRequestTest
, DataURLImageTest
) {
686 // Use our nice little Chrome logo.
687 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
689 "data:image/png;base64,"
690 "iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAADVklEQVQ4jX2TfUwUBBjG3"
691 "w1y+HGcd9dxhXR8T4awOccJGgOSWclHImznLkTlSw0DDQXkrmgYgbUYnlQTqQxIEVxitD"
692 "5UMCATRA1CEEg+Qjw3bWDxIauJv/5oumqs39/P827vnucRmYN0gyF01GI5MpCVdW0gO7t"
693 "vNC+vqSEtbZefk5NuLv1jdJ46p/zw0HeH4+PHr3h7c1mjoV2t5rKzMx1+fg9bAgK6zHq9"
694 "cU5z+LpA3xOtx34+vTeT21onRuzssC3zxbbSwC13d/pFuC7CkIMDxQpF7r/MWq12UctI1"
695 "dWWm99ypqSYmRUBdKem8MkrO/kgaTt1O7YzlpzE5GIVd0WYUqt57yWf2McHTObYPbVD+Z"
696 "wbtlLTVMZ3BW+TnLyXLaWtmEq6WJVbT3HBh3Svj2HQQcm43XwmtoYM6vVKleh0uoWvnzW"
697 "3v3MpidruPTQPf0bia7sJOtBM0ufTWNvus/nkDFHF9ZS+uYVjRUasMeHUmyLYtcklTvzW"
698 "GFZnNOXczThvpKIzjcahSqIzkvDLayDq6D3eOjtBbNUEIZYyqsvj4V4wY92eNJ4IoyhTb"
699 "xXX1T5xsV9tm9r4TQwHLiZw/pdDZJea8TKmsmR/K0uLh/GwnCHghTja6lPhphezPfO5/5"
700 "MrVvMzNaI3+ERHfrFzPKQukrQGI4d/3EFD/3E2mVNYvi4at7CXWREaxZGD+3hg28zD3gV"
701 "Md6q5c8GdosynKmSeRuGzpjyl1/9UDGtPR5HeaKT8Wjo17WXk579BXVUhN64ehF9fhRtq"
702 "/uxxZKzNiZFGD0wRC3NFROZ5mwIPL/96K/rKMMLrIzF9uhHr+/sYH7DAbwlgC4J+R2Z7F"
703 "Ux1qLnV7MGF40smVSoJ/jvHRfYhQeUJd/SnYtGWhPHR0Sz+GE2F2yth0B36Vcz2KpnufB"
704 "JbsysjjW4kblBUiIjiURUWqJY65zxbnTy57GQyH58zgy0QBtTQv5gH15XMdKkYu+TGaJM"
705 "nlm2O34uI4b9tflqp1+QEFGzoW/ulmcofcpkZCYJhDfSpme7QcrHa+Xfji8paEQkTkSfm"
706 "moRWRNZr/F1KfVMjW+IKEnv2FwZfKdzt0BQR6lClcZR0EfEXEfv/G6W9iLiIyCoReV5En"
707 "hORIBHx+ufPj/gLB/zGI/G4Bk0AAAAASUVORK5CYII="),
708 DEFAULT_PRIORITY
, &d
, NULL
));
711 EXPECT_TRUE(r
->is_pending());
713 base::RunLoop().Run();
715 EXPECT_TRUE(!r
->is_pending());
716 EXPECT_FALSE(d
.received_data_before_response());
717 EXPECT_EQ(d
.bytes_received(), 911);
718 EXPECT_EQ("", r
->GetSocketAddress().host());
719 EXPECT_EQ(0, r
->GetSocketAddress().port());
721 HttpRequestHeaders headers
;
722 EXPECT_FALSE(r
->GetFullRequestHeaders(&headers
));
726 #if !defined(DISABLE_FILE_SUPPORT)
727 TEST_F(URLRequestTest
, FileTest
) {
728 base::FilePath app_path
;
729 PathService::Get(base::FILE_EXE
, &app_path
);
730 GURL app_url
= FilePathToFileURL(app_path
);
734 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
735 app_url
, DEFAULT_PRIORITY
, &d
, NULL
));
738 EXPECT_TRUE(r
->is_pending());
740 base::RunLoop().Run();
742 int64 file_size
= -1;
743 EXPECT_TRUE(base::GetFileSize(app_path
, &file_size
));
745 EXPECT_TRUE(!r
->is_pending());
746 EXPECT_EQ(1, d
.response_started_count());
747 EXPECT_FALSE(d
.received_data_before_response());
748 EXPECT_EQ(d
.bytes_received(), static_cast<int>(file_size
));
749 EXPECT_EQ("", r
->GetSocketAddress().host());
750 EXPECT_EQ(0, r
->GetSocketAddress().port());
752 HttpRequestHeaders headers
;
753 EXPECT_FALSE(r
->GetFullRequestHeaders(&headers
));
757 TEST_F(URLRequestTest
, FileTestCancel
) {
758 base::FilePath app_path
;
759 PathService::Get(base::FILE_EXE
, &app_path
);
760 GURL app_url
= FilePathToFileURL(app_path
);
764 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
765 app_url
, DEFAULT_PRIORITY
, &d
, NULL
));
768 EXPECT_TRUE(r
->is_pending());
771 // Async cancellation should be safe even when URLRequest has been already
773 base::RunLoop().RunUntilIdle();
776 TEST_F(URLRequestTest
, FileTestFullSpecifiedRange
) {
777 const size_t buffer_size
= 4000;
778 scoped_ptr
<char[]> buffer(new char[buffer_size
]);
779 FillBuffer(buffer
.get(), buffer_size
);
781 base::FilePath temp_path
;
782 EXPECT_TRUE(base::CreateTemporaryFile(&temp_path
));
783 GURL temp_url
= FilePathToFileURL(temp_path
);
784 EXPECT_TRUE(base::WriteFile(temp_path
, buffer
.get(), buffer_size
));
787 EXPECT_TRUE(base::GetFileSize(temp_path
, &file_size
));
789 const size_t first_byte_position
= 500;
790 const size_t last_byte_position
= buffer_size
- first_byte_position
;
791 const size_t content_length
= last_byte_position
- first_byte_position
+ 1;
792 std::string
partial_buffer_string(buffer
.get() + first_byte_position
,
793 buffer
.get() + last_byte_position
+ 1);
797 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
798 temp_url
, DEFAULT_PRIORITY
, &d
, NULL
));
800 HttpRequestHeaders headers
;
802 HttpRequestHeaders::kRange
,
803 HttpByteRange::Bounded(
804 first_byte_position
, last_byte_position
).GetHeaderValue());
805 r
->SetExtraRequestHeaders(headers
);
807 EXPECT_TRUE(r
->is_pending());
809 base::RunLoop().Run();
810 EXPECT_TRUE(!r
->is_pending());
811 EXPECT_EQ(1, d
.response_started_count());
812 EXPECT_FALSE(d
.received_data_before_response());
813 EXPECT_EQ(static_cast<int>(content_length
), d
.bytes_received());
814 // Don't use EXPECT_EQ, it will print out a lot of garbage if check failed.
815 EXPECT_TRUE(partial_buffer_string
== d
.data_received());
818 EXPECT_TRUE(base::DeleteFile(temp_path
, false));
821 TEST_F(URLRequestTest
, FileTestHalfSpecifiedRange
) {
822 const size_t buffer_size
= 4000;
823 scoped_ptr
<char[]> buffer(new char[buffer_size
]);
824 FillBuffer(buffer
.get(), buffer_size
);
826 base::FilePath temp_path
;
827 EXPECT_TRUE(base::CreateTemporaryFile(&temp_path
));
828 GURL temp_url
= FilePathToFileURL(temp_path
);
829 EXPECT_TRUE(base::WriteFile(temp_path
, buffer
.get(), buffer_size
));
832 EXPECT_TRUE(base::GetFileSize(temp_path
, &file_size
));
834 const size_t first_byte_position
= 500;
835 const size_t last_byte_position
= buffer_size
- 1;
836 const size_t content_length
= last_byte_position
- first_byte_position
+ 1;
837 std::string
partial_buffer_string(buffer
.get() + first_byte_position
,
838 buffer
.get() + last_byte_position
+ 1);
842 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
843 temp_url
, DEFAULT_PRIORITY
, &d
, NULL
));
845 HttpRequestHeaders headers
;
846 headers
.SetHeader(HttpRequestHeaders::kRange
,
847 HttpByteRange::RightUnbounded(
848 first_byte_position
).GetHeaderValue());
849 r
->SetExtraRequestHeaders(headers
);
851 EXPECT_TRUE(r
->is_pending());
853 base::RunLoop().Run();
854 EXPECT_TRUE(!r
->is_pending());
855 EXPECT_EQ(1, d
.response_started_count());
856 EXPECT_FALSE(d
.received_data_before_response());
857 EXPECT_EQ(static_cast<int>(content_length
), d
.bytes_received());
858 // Don't use EXPECT_EQ, it will print out a lot of garbage if check failed.
859 EXPECT_TRUE(partial_buffer_string
== d
.data_received());
862 EXPECT_TRUE(base::DeleteFile(temp_path
, false));
865 TEST_F(URLRequestTest
, FileTestMultipleRanges
) {
866 const size_t buffer_size
= 400000;
867 scoped_ptr
<char[]> buffer(new char[buffer_size
]);
868 FillBuffer(buffer
.get(), buffer_size
);
870 base::FilePath temp_path
;
871 EXPECT_TRUE(base::CreateTemporaryFile(&temp_path
));
872 GURL temp_url
= FilePathToFileURL(temp_path
);
873 EXPECT_TRUE(base::WriteFile(temp_path
, buffer
.get(), buffer_size
));
876 EXPECT_TRUE(base::GetFileSize(temp_path
, &file_size
));
880 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
881 temp_url
, DEFAULT_PRIORITY
, &d
, NULL
));
883 HttpRequestHeaders headers
;
884 headers
.SetHeader(HttpRequestHeaders::kRange
, "bytes=0-0,10-200,200-300");
885 r
->SetExtraRequestHeaders(headers
);
887 EXPECT_TRUE(r
->is_pending());
889 base::RunLoop().Run();
890 EXPECT_TRUE(d
.request_failed());
893 EXPECT_TRUE(base::DeleteFile(temp_path
, false));
896 TEST_F(URLRequestTest
, AllowFileURLs
) {
897 base::ScopedTempDir temp_dir
;
898 ASSERT_TRUE(temp_dir
.CreateUniqueTempDir());
899 base::FilePath test_file
;
900 ASSERT_TRUE(base::CreateTemporaryFileInDir(temp_dir
.path(), &test_file
));
901 std::string
test_data("monkey");
902 base::WriteFile(test_file
, test_data
.data(), test_data
.size());
903 GURL test_file_url
= FilePathToFileURL(test_file
);
907 TestNetworkDelegate network_delegate
;
908 network_delegate
.set_can_access_files(true);
909 default_context_
.set_network_delegate(&network_delegate
);
910 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
911 test_file_url
, DEFAULT_PRIORITY
, &d
, NULL
));
913 base::RunLoop().Run();
914 EXPECT_FALSE(d
.request_failed());
915 EXPECT_EQ(test_data
, d
.data_received());
920 TestNetworkDelegate network_delegate
;
921 network_delegate
.set_can_access_files(false);
922 default_context_
.set_network_delegate(&network_delegate
);
923 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
924 test_file_url
, DEFAULT_PRIORITY
, &d
, NULL
));
926 base::RunLoop().Run();
927 EXPECT_TRUE(d
.request_failed());
928 EXPECT_EQ("", d
.data_received());
933 TEST_F(URLRequestTest
, FileDirCancelTest
) {
934 // Put in mock resource provider.
935 NetModule::SetResourceProvider(TestNetResourceProvider
);
939 base::FilePath file_path
;
940 PathService::Get(base::DIR_SOURCE_ROOT
, &file_path
);
941 file_path
= file_path
.Append(FILE_PATH_LITERAL("net"));
942 file_path
= file_path
.Append(FILE_PATH_LITERAL("data"));
944 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
945 FilePathToFileURL(file_path
), DEFAULT_PRIORITY
, &d
, NULL
));
947 EXPECT_TRUE(req
->is_pending());
949 d
.set_cancel_in_received_data_pending(true);
951 base::RunLoop().Run();
954 // Take out mock resource provider.
955 NetModule::SetResourceProvider(NULL
);
958 TEST_F(URLRequestTest
, FileDirOutputSanity
) {
959 // Verify the general sanity of the the output of the file:
960 // directory lister by checking for the output of a known existing
962 const char sentinel_name
[] = "filedir-sentinel";
965 PathService::Get(base::DIR_SOURCE_ROOT
, &path
);
966 path
= path
.Append(FILE_PATH_LITERAL("net"));
967 path
= path
.Append(FILE_PATH_LITERAL("data"));
968 path
= path
.Append(FILE_PATH_LITERAL("url_request_unittest"));
971 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
972 FilePathToFileURL(path
), DEFAULT_PRIORITY
, &d
, NULL
));
974 base::RunLoop().Run();
976 // Generate entry for the sentinel file.
977 base::FilePath sentinel_path
= path
.AppendASCII(sentinel_name
);
978 base::File::Info info
;
979 EXPECT_TRUE(base::GetFileInfo(sentinel_path
, &info
));
980 EXPECT_GT(info
.size
, 0);
981 std::string sentinel_output
= GetDirectoryListingEntry(
982 base::string16(sentinel_name
, sentinel_name
+ strlen(sentinel_name
)),
983 std::string(sentinel_name
),
988 ASSERT_LT(0, d
.bytes_received());
989 ASSERT_FALSE(d
.request_failed());
990 ASSERT_TRUE(req
->status().is_success());
991 // Check for the entry generated for the "sentinel" file.
992 const std::string
& data
= d
.data_received();
993 ASSERT_NE(data
.find(sentinel_output
), std::string::npos
);
996 TEST_F(URLRequestTest
, FileDirRedirectNoCrash
) {
997 // There is an implicit redirect when loading a file path that matches a
998 // directory and does not end with a slash. Ensure that following such
999 // redirects does not crash. See http://crbug.com/18686.
1001 base::FilePath path
;
1002 PathService::Get(base::DIR_SOURCE_ROOT
, &path
);
1003 path
= path
.Append(FILE_PATH_LITERAL("net"));
1004 path
= path
.Append(FILE_PATH_LITERAL("data"));
1005 path
= path
.Append(FILE_PATH_LITERAL("url_request_unittest"));
1008 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
1009 FilePathToFileURL(path
), DEFAULT_PRIORITY
, &d
, NULL
));
1011 base::RunLoop().Run();
1013 ASSERT_EQ(1, d
.received_redirect_count());
1014 ASSERT_LT(0, d
.bytes_received());
1015 ASSERT_FALSE(d
.request_failed());
1016 ASSERT_TRUE(req
->status().is_success());
1020 // Don't accept the url "file:///" on windows. See http://crbug.com/1474.
1021 TEST_F(URLRequestTest
, FileDirRedirectSingleSlash
) {
1023 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
1024 GURL("file:///"), DEFAULT_PRIORITY
, &d
, NULL
));
1026 base::RunLoop().Run();
1028 ASSERT_EQ(1, d
.received_redirect_count());
1029 ASSERT_FALSE(req
->status().is_success());
1031 #endif // defined(OS_WIN)
1033 #endif // !defined(DISABLE_FILE_SUPPORT)
1035 TEST_F(URLRequestTest
, InvalidUrlTest
) {
1038 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
1039 GURL("invalid url"), DEFAULT_PRIORITY
, &d
, NULL
));
1042 EXPECT_TRUE(r
->is_pending());
1044 base::RunLoop().Run();
1045 EXPECT_TRUE(d
.request_failed());
1049 TEST_F(URLRequestTest
, InvalidReferrerTest
) {
1050 TestURLRequestContext context
;
1051 TestNetworkDelegate network_delegate
;
1052 network_delegate
.set_cancel_request_with_policy_violating_referrer(true);
1053 context
.set_network_delegate(&network_delegate
);
1055 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
1056 GURL("http://localhost/"), DEFAULT_PRIORITY
, &d
, NULL
));
1057 req
->SetReferrer("https://somewhere.com/");
1060 base::RunLoop().Run();
1061 EXPECT_TRUE(d
.request_failed());
1065 TEST_F(URLRequestTest
, ResolveShortcutTest
) {
1066 base::FilePath app_path
;
1067 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
1068 app_path
= app_path
.AppendASCII("net");
1069 app_path
= app_path
.AppendASCII("data");
1070 app_path
= app_path
.AppendASCII("url_request_unittest");
1071 app_path
= app_path
.AppendASCII("with-headers.html");
1073 std::wstring lnk_path
= app_path
.value() + L
".lnk";
1075 base::win::ScopedCOMInitializer com_initializer
;
1077 // Temporarily create a shortcut for test
1079 base::win::ScopedComPtr
<IShellLink
> shell
;
1080 ASSERT_TRUE(SUCCEEDED(shell
.CreateInstance(CLSID_ShellLink
, NULL
,
1081 CLSCTX_INPROC_SERVER
)));
1082 base::win::ScopedComPtr
<IPersistFile
> persist
;
1083 ASSERT_TRUE(SUCCEEDED(shell
.QueryInterface(persist
.Receive())));
1084 EXPECT_TRUE(SUCCEEDED(shell
->SetPath(app_path
.value().c_str())));
1085 EXPECT_TRUE(SUCCEEDED(shell
->SetDescription(L
"ResolveShortcutTest")));
1086 EXPECT_TRUE(SUCCEEDED(persist
->Save(lnk_path
.c_str(), TRUE
)));
1091 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
1092 FilePathToFileURL(base::FilePath(lnk_path
)), DEFAULT_PRIORITY
, &d
,
1096 EXPECT_TRUE(r
->is_pending());
1098 base::RunLoop().Run();
1100 WIN32_FILE_ATTRIBUTE_DATA data
;
1101 GetFileAttributesEx(app_path
.value().c_str(),
1102 GetFileExInfoStandard
, &data
);
1103 HANDLE file
= CreateFile(app_path
.value().c_str(), GENERIC_READ
,
1104 FILE_SHARE_READ
, NULL
, OPEN_EXISTING
,
1105 FILE_ATTRIBUTE_NORMAL
, NULL
);
1106 EXPECT_NE(INVALID_HANDLE_VALUE
, file
);
1107 scoped_ptr
<char[]> buffer(new char[data
.nFileSizeLow
]);
1110 result
= ReadFile(file
, buffer
.get(), data
.nFileSizeLow
,
1112 std::string
content(buffer
.get(), read_size
);
1115 EXPECT_TRUE(!r
->is_pending());
1116 EXPECT_EQ(1, d
.received_redirect_count());
1117 EXPECT_EQ(content
, d
.data_received());
1120 // Clean the shortcut
1121 DeleteFile(lnk_path
.c_str());
1123 #endif // defined(OS_WIN)
1125 // Custom URLRequestJobs for use with interceptor tests
1126 class RestartTestJob
: public URLRequestTestJob
{
1128 RestartTestJob(URLRequest
* request
, NetworkDelegate
* network_delegate
)
1129 : URLRequestTestJob(request
, network_delegate
, true) {}
1131 void StartAsync() override
{ this->NotifyRestartRequired(); }
1133 ~RestartTestJob() override
{}
1136 class CancelTestJob
: public URLRequestTestJob
{
1138 explicit CancelTestJob(URLRequest
* request
, NetworkDelegate
* network_delegate
)
1139 : URLRequestTestJob(request
, network_delegate
, true) {}
1141 void StartAsync() override
{ request_
->Cancel(); }
1143 ~CancelTestJob() override
{}
1146 class CancelThenRestartTestJob
: public URLRequestTestJob
{
1148 explicit CancelThenRestartTestJob(URLRequest
* request
,
1149 NetworkDelegate
* network_delegate
)
1150 : URLRequestTestJob(request
, network_delegate
, true) {
1153 void StartAsync() override
{
1155 this->NotifyRestartRequired();
1158 ~CancelThenRestartTestJob() override
{}
1161 // An Interceptor for use with interceptor tests.
1162 class MockURLRequestInterceptor
: public URLRequestInterceptor
{
1164 // Static getters for canned response header and data strings.
1165 static std::string
ok_data() {
1166 return URLRequestTestJob::test_data_1();
1169 static std::string
ok_headers() {
1170 return URLRequestTestJob::test_headers();
1173 static std::string
redirect_data() {
1174 return std::string();
1177 static std::string
redirect_headers() {
1178 return URLRequestTestJob::test_redirect_headers();
1181 static std::string
error_data() {
1182 return std::string("ohhh nooooo mr. bill!");
1185 static std::string
error_headers() {
1186 return URLRequestTestJob::test_error_headers();
1189 MockURLRequestInterceptor()
1190 : intercept_main_request_(false), restart_main_request_(false),
1191 cancel_main_request_(false), cancel_then_restart_main_request_(false),
1192 simulate_main_network_error_(false),
1193 intercept_redirect_(false), cancel_redirect_request_(false),
1194 intercept_final_response_(false), cancel_final_request_(false),
1195 use_url_request_http_job_(false),
1196 did_intercept_main_(false), did_restart_main_(false),
1197 did_cancel_main_(false), did_cancel_then_restart_main_(false),
1198 did_simulate_error_main_(false),
1199 did_intercept_redirect_(false), did_cancel_redirect_(false),
1200 did_intercept_final_(false), did_cancel_final_(false) {
1203 ~MockURLRequestInterceptor() override
{
1206 // URLRequestInterceptor implementation:
1207 URLRequestJob
* MaybeInterceptRequest(
1208 URLRequest
* request
,
1209 NetworkDelegate
* network_delegate
) const override
{
1210 if (restart_main_request_
) {
1211 restart_main_request_
= false;
1212 did_restart_main_
= true;
1213 return new RestartTestJob(request
, network_delegate
);
1215 if (cancel_main_request_
) {
1216 cancel_main_request_
= false;
1217 did_cancel_main_
= true;
1218 return new CancelTestJob(request
, network_delegate
);
1220 if (cancel_then_restart_main_request_
) {
1221 cancel_then_restart_main_request_
= false;
1222 did_cancel_then_restart_main_
= true;
1223 return new CancelThenRestartTestJob(request
, network_delegate
);
1225 if (simulate_main_network_error_
) {
1226 simulate_main_network_error_
= false;
1227 did_simulate_error_main_
= true;
1228 if (use_url_request_http_job_
) {
1229 return URLRequestHttpJob::Factory(request
, network_delegate
, "http");
1231 // This job will result in error since the requested URL is not one of the
1232 // URLs supported by these tests.
1233 return new URLRequestTestJob(request
, network_delegate
, true);
1235 if (!intercept_main_request_
)
1237 intercept_main_request_
= false;
1238 did_intercept_main_
= true;
1239 URLRequestTestJob
* job
= new URLRequestTestJob(request
,
1244 job
->set_load_timing_info(main_request_load_timing_info_
);
1248 URLRequestJob
* MaybeInterceptRedirect(URLRequest
* request
,
1249 NetworkDelegate
* network_delegate
,
1250 const GURL
& location
) const override
{
1251 if (cancel_redirect_request_
) {
1252 cancel_redirect_request_
= false;
1253 did_cancel_redirect_
= true;
1254 return new CancelTestJob(request
, network_delegate
);
1256 if (!intercept_redirect_
)
1258 intercept_redirect_
= false;
1259 did_intercept_redirect_
= true;
1260 if (use_url_request_http_job_
) {
1261 return URLRequestHttpJob::Factory(request
, network_delegate
, "http");
1263 return new URLRequestTestJob(request
,
1270 URLRequestJob
* MaybeInterceptResponse(
1271 URLRequest
* request
,
1272 NetworkDelegate
* network_delegate
) const override
{
1273 if (cancel_final_request_
) {
1274 cancel_final_request_
= false;
1275 did_cancel_final_
= true;
1276 return new CancelTestJob(request
, network_delegate
);
1278 if (!intercept_final_response_
)
1280 intercept_final_response_
= false;
1281 did_intercept_final_
= true;
1282 if (use_url_request_http_job_
) {
1283 return URLRequestHttpJob::Factory(request
, network_delegate
, "http");
1285 return new URLRequestTestJob(request
,
1292 void set_intercept_main_request(bool intercept_main_request
) {
1293 intercept_main_request_
= intercept_main_request
;
1296 void set_main_headers(const std::string
& main_headers
) {
1297 main_headers_
= main_headers
;
1300 void set_main_data(const std::string
& main_data
) {
1301 main_data_
= main_data
;
1304 void set_main_request_load_timing_info(
1305 const LoadTimingInfo
& main_request_load_timing_info
) {
1306 main_request_load_timing_info_
= main_request_load_timing_info
;
1309 void set_restart_main_request(bool restart_main_request
) {
1310 restart_main_request_
= restart_main_request
;
1313 void set_cancel_main_request(bool cancel_main_request
) {
1314 cancel_main_request_
= cancel_main_request
;
1317 void set_cancel_then_restart_main_request(
1318 bool cancel_then_restart_main_request
) {
1319 cancel_then_restart_main_request_
= cancel_then_restart_main_request
;
1322 void set_simulate_main_network_error(bool simulate_main_network_error
) {
1323 simulate_main_network_error_
= simulate_main_network_error
;
1326 void set_intercept_redirect(bool intercept_redirect
) {
1327 intercept_redirect_
= intercept_redirect
;
1330 void set_redirect_headers(const std::string
& redirect_headers
) {
1331 redirect_headers_
= redirect_headers
;
1334 void set_redirect_data(const std::string
& redirect_data
) {
1335 redirect_data_
= redirect_data
;
1338 void set_cancel_redirect_request(bool cancel_redirect_request
) {
1339 cancel_redirect_request_
= cancel_redirect_request
;
1342 void set_intercept_final_response(bool intercept_final_response
) {
1343 intercept_final_response_
= intercept_final_response
;
1346 void set_final_headers(const std::string
& final_headers
) {
1347 final_headers_
= final_headers
;
1350 void set_final_data(const std::string
& final_data
) {
1351 final_data_
= final_data
;
1354 void set_cancel_final_request(bool cancel_final_request
) {
1355 cancel_final_request_
= cancel_final_request
;
1358 void set_use_url_request_http_job(bool use_url_request_http_job
) {
1359 use_url_request_http_job_
= use_url_request_http_job
;
1362 bool did_intercept_main() const {
1363 return did_intercept_main_
;
1366 bool did_restart_main() const {
1367 return did_restart_main_
;
1370 bool did_cancel_main() const {
1371 return did_cancel_main_
;
1374 bool did_cancel_then_restart_main() const {
1375 return did_cancel_then_restart_main_
;
1378 bool did_simulate_error_main() const {
1379 return did_simulate_error_main_
;
1382 bool did_intercept_redirect() const {
1383 return did_intercept_redirect_
;
1386 bool did_cancel_redirect() const {
1387 return did_cancel_redirect_
;
1390 bool did_intercept_final() const {
1391 return did_intercept_final_
;
1394 bool did_cancel_final() const {
1395 return did_cancel_final_
;
1399 // Indicate whether to intercept the main request, and if so specify the
1400 // response to return and the LoadTimingInfo to use.
1401 mutable bool intercept_main_request_
;
1402 mutable std::string main_headers_
;
1403 mutable std::string main_data_
;
1404 mutable LoadTimingInfo main_request_load_timing_info_
;
1406 // These indicate actions that can be taken within MaybeInterceptRequest.
1407 mutable bool restart_main_request_
;
1408 mutable bool cancel_main_request_
;
1409 mutable bool cancel_then_restart_main_request_
;
1410 mutable bool simulate_main_network_error_
;
1412 // Indicate whether to intercept redirects, and if so specify the response to
1414 mutable bool intercept_redirect_
;
1415 mutable std::string redirect_headers_
;
1416 mutable std::string redirect_data_
;
1418 // Cancel the request within MaybeInterceptRedirect.
1419 mutable bool cancel_redirect_request_
;
1421 // Indicate whether to intercept the final response, and if so specify the
1422 // response to return.
1423 mutable bool intercept_final_response_
;
1424 mutable std::string final_headers_
;
1425 mutable std::string final_data_
;
1427 // Cancel the final request within MaybeInterceptResponse.
1428 mutable bool cancel_final_request_
;
1430 // Instruct the interceptor to use a real URLRequestHTTPJob.
1431 mutable bool use_url_request_http_job_
;
1433 // These indicate if the interceptor did something or not.
1434 mutable bool did_intercept_main_
;
1435 mutable bool did_restart_main_
;
1436 mutable bool did_cancel_main_
;
1437 mutable bool did_cancel_then_restart_main_
;
1438 mutable bool did_simulate_error_main_
;
1439 mutable bool did_intercept_redirect_
;
1440 mutable bool did_cancel_redirect_
;
1441 mutable bool did_intercept_final_
;
1442 mutable bool did_cancel_final_
;
1445 // Inherit PlatformTest since we require the autorelease pool on Mac OS X.
1446 class URLRequestInterceptorTest
: public URLRequestTest
{
1448 URLRequestInterceptorTest() : URLRequestTest(), interceptor_(NULL
) {
1451 ~URLRequestInterceptorTest() override
{
1452 // URLRequestJobs may post clean-up tasks on destruction.
1453 base::RunLoop().RunUntilIdle();
1456 void SetUpFactory() override
{
1457 interceptor_
= new MockURLRequestInterceptor();
1458 job_factory_
.reset(new URLRequestInterceptingJobFactory(
1459 job_factory_
.Pass(), make_scoped_ptr(interceptor_
)));
1462 MockURLRequestInterceptor
* interceptor() const {
1463 return interceptor_
;
1467 MockURLRequestInterceptor
* interceptor_
;
1470 TEST_F(URLRequestInterceptorTest
, Intercept
) {
1471 // Intercept the main request and respond with a simple response.
1472 interceptor()->set_intercept_main_request(true);
1473 interceptor()->set_main_headers(MockURLRequestInterceptor::ok_headers());
1474 interceptor()->set_main_data(MockURLRequestInterceptor::ok_data());
1476 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1477 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1478 base::SupportsUserData::Data
* user_data0
= new base::SupportsUserData::Data();
1479 base::SupportsUserData::Data
* user_data1
= new base::SupportsUserData::Data();
1480 base::SupportsUserData::Data
* user_data2
= new base::SupportsUserData::Data();
1481 req
->SetUserData(nullptr, user_data0
);
1482 req
->SetUserData(&user_data1
, user_data1
);
1483 req
->SetUserData(&user_data2
, user_data2
);
1484 req
->set_method("GET");
1486 base::RunLoop().Run();
1488 // Make sure we can retrieve our specific user data.
1489 EXPECT_EQ(user_data0
, req
->GetUserData(nullptr));
1490 EXPECT_EQ(user_data1
, req
->GetUserData(&user_data1
));
1491 EXPECT_EQ(user_data2
, req
->GetUserData(&user_data2
));
1493 // Check that we got one good response.
1494 EXPECT_TRUE(req
->status().is_success());
1495 EXPECT_EQ(200, req
->response_headers()->response_code());
1496 EXPECT_EQ(MockURLRequestInterceptor::ok_data(), d
.data_received());
1497 EXPECT_EQ(1, d
.response_started_count());
1498 EXPECT_EQ(0, d
.received_redirect_count());
1501 TEST_F(URLRequestInterceptorTest
, InterceptRedirect
) {
1502 // Intercept the main request and respond with a redirect.
1503 interceptor()->set_intercept_main_request(true);
1504 interceptor()->set_main_headers(
1505 MockURLRequestInterceptor::redirect_headers());
1506 interceptor()->set_main_data(MockURLRequestInterceptor::redirect_data());
1508 // Intercept that redirect and respond with a final OK response.
1509 interceptor()->set_intercept_redirect(true);
1510 interceptor()->set_redirect_headers(MockURLRequestInterceptor::ok_headers());
1511 interceptor()->set_redirect_data(MockURLRequestInterceptor::ok_data());
1514 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1515 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1516 req
->set_method("GET");
1518 base::RunLoop().Run();
1520 // Check that the interceptor got called as expected.
1521 EXPECT_TRUE(interceptor()->did_intercept_main());
1522 EXPECT_TRUE(interceptor()->did_intercept_redirect());
1524 // Check that we got one good response.
1525 EXPECT_TRUE(req
->status().is_success());
1526 if (req
->status().is_success())
1527 EXPECT_EQ(200, req
->response_headers()->response_code());
1529 EXPECT_EQ(MockURLRequestInterceptor::ok_data(), d
.data_received());
1530 EXPECT_EQ(1, d
.response_started_count());
1531 EXPECT_EQ(0, d
.received_redirect_count());
1534 TEST_F(URLRequestInterceptorTest
, InterceptServerError
) {
1535 // Intercept the main request to generate a server error response.
1536 interceptor()->set_intercept_main_request(true);
1537 interceptor()->set_main_headers(MockURLRequestInterceptor::error_headers());
1538 interceptor()->set_main_data(MockURLRequestInterceptor::error_data());
1540 // Intercept that error and respond with an OK response.
1541 interceptor()->set_intercept_final_response(true);
1542 interceptor()->set_final_headers(MockURLRequestInterceptor::ok_headers());
1543 interceptor()->set_final_data(MockURLRequestInterceptor::ok_data());
1546 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1547 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1548 req
->set_method("GET");
1550 base::RunLoop().Run();
1552 // Check that the interceptor got called as expected.
1553 EXPECT_TRUE(interceptor()->did_intercept_main());
1554 EXPECT_TRUE(interceptor()->did_intercept_final());
1556 // Check that we got one good response.
1557 EXPECT_TRUE(req
->status().is_success());
1558 EXPECT_EQ(200, req
->response_headers()->response_code());
1559 EXPECT_EQ(MockURLRequestInterceptor::ok_data(), d
.data_received());
1560 EXPECT_EQ(1, d
.response_started_count());
1561 EXPECT_EQ(0, d
.received_redirect_count());
1564 TEST_F(URLRequestInterceptorTest
, InterceptNetworkError
) {
1565 // Intercept the main request to simulate a network error.
1566 interceptor()->set_simulate_main_network_error(true);
1568 // Intercept that error and respond with an OK response.
1569 interceptor()->set_intercept_final_response(true);
1570 interceptor()->set_final_headers(MockURLRequestInterceptor::ok_headers());
1571 interceptor()->set_final_data(MockURLRequestInterceptor::ok_data());
1574 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1575 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1576 req
->set_method("GET");
1578 base::RunLoop().Run();
1580 // Check that the interceptor got called as expected.
1581 EXPECT_TRUE(interceptor()->did_simulate_error_main());
1582 EXPECT_TRUE(interceptor()->did_intercept_final());
1584 // Check that we received one good response.
1585 EXPECT_TRUE(req
->status().is_success());
1586 EXPECT_EQ(200, req
->response_headers()->response_code());
1587 EXPECT_EQ(MockURLRequestInterceptor::ok_data(), d
.data_received());
1588 EXPECT_EQ(1, d
.response_started_count());
1589 EXPECT_EQ(0, d
.received_redirect_count());
1592 TEST_F(URLRequestInterceptorTest
, InterceptRestartRequired
) {
1593 // Restart the main request.
1594 interceptor()->set_restart_main_request(true);
1596 // then intercept the new main request and respond with an OK response
1597 interceptor()->set_intercept_main_request(true);
1598 interceptor()->set_main_headers(MockURLRequestInterceptor::ok_headers());
1599 interceptor()->set_main_data(MockURLRequestInterceptor::ok_data());
1602 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1603 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1604 req
->set_method("GET");
1606 base::RunLoop().Run();
1608 // Check that the interceptor got called as expected.
1609 EXPECT_TRUE(interceptor()->did_restart_main());
1610 EXPECT_TRUE(interceptor()->did_intercept_main());
1612 // Check that we received one good response.
1613 EXPECT_TRUE(req
->status().is_success());
1614 if (req
->status().is_success())
1615 EXPECT_EQ(200, req
->response_headers()->response_code());
1617 EXPECT_EQ(MockURLRequestInterceptor::ok_data(), d
.data_received());
1618 EXPECT_EQ(1, d
.response_started_count());
1619 EXPECT_EQ(0, d
.received_redirect_count());
1622 TEST_F(URLRequestInterceptorTest
, InterceptRespectsCancelMain
) {
1623 // Intercept the main request and cancel from within the restarted job.
1624 interceptor()->set_cancel_main_request(true);
1626 // Set up to intercept the final response and override it with an OK response.
1627 interceptor()->set_intercept_final_response(true);
1628 interceptor()->set_final_headers(MockURLRequestInterceptor::ok_headers());
1629 interceptor()->set_final_data(MockURLRequestInterceptor::ok_data());
1632 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1633 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1634 req
->set_method("GET");
1636 base::RunLoop().Run();
1638 // Check that the interceptor got called as expected.
1639 EXPECT_TRUE(interceptor()->did_cancel_main());
1640 EXPECT_FALSE(interceptor()->did_intercept_final());
1642 // Check that we see a canceled request.
1643 EXPECT_FALSE(req
->status().is_success());
1644 EXPECT_EQ(URLRequestStatus::CANCELED
, req
->status().status());
1647 TEST_F(URLRequestInterceptorTest
, InterceptRespectsCancelRedirect
) {
1648 // Intercept the main request and respond with a redirect.
1649 interceptor()->set_intercept_main_request(true);
1650 interceptor()->set_main_headers(
1651 MockURLRequestInterceptor::redirect_headers());
1652 interceptor()->set_main_data(MockURLRequestInterceptor::redirect_data());
1654 // Intercept the redirect and cancel from within that job.
1655 interceptor()->set_cancel_redirect_request(true);
1657 // Set up to intercept the final response and override it with an OK response.
1658 interceptor()->set_intercept_final_response(true);
1659 interceptor()->set_final_headers(MockURLRequestInterceptor::ok_headers());
1660 interceptor()->set_final_data(MockURLRequestInterceptor::ok_data());
1663 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1664 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1665 req
->set_method("GET");
1667 base::RunLoop().Run();
1669 // Check that the interceptor got called as expected.
1670 EXPECT_TRUE(interceptor()->did_intercept_main());
1671 EXPECT_TRUE(interceptor()->did_cancel_redirect());
1672 EXPECT_FALSE(interceptor()->did_intercept_final());
1674 // Check that we see a canceled request.
1675 EXPECT_FALSE(req
->status().is_success());
1676 EXPECT_EQ(URLRequestStatus::CANCELED
, req
->status().status());
1679 TEST_F(URLRequestInterceptorTest
, InterceptRespectsCancelFinal
) {
1680 // Intercept the main request to simulate a network error.
1681 interceptor()->set_simulate_main_network_error(true);
1683 // Set up to intercept final the response and cancel from within that job.
1684 interceptor()->set_cancel_final_request(true);
1687 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1688 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1689 req
->set_method("GET");
1691 base::RunLoop().Run();
1693 // Check that the interceptor got called as expected.
1694 EXPECT_TRUE(interceptor()->did_simulate_error_main());
1695 EXPECT_TRUE(interceptor()->did_cancel_final());
1697 // Check that we see a canceled request.
1698 EXPECT_FALSE(req
->status().is_success());
1699 EXPECT_EQ(URLRequestStatus::CANCELED
, req
->status().status());
1702 TEST_F(URLRequestInterceptorTest
, InterceptRespectsCancelInRestart
) {
1703 // Intercept the main request and cancel then restart from within that job.
1704 interceptor()->set_cancel_then_restart_main_request(true);
1706 // Set up to intercept the final response and override it with an OK response.
1707 interceptor()->set_intercept_final_response(true);
1708 interceptor()->set_final_headers(MockURLRequestInterceptor::ok_headers());
1709 interceptor()->set_final_data(MockURLRequestInterceptor::ok_data());
1712 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
1713 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1714 req
->set_method("GET");
1716 base::RunLoop().Run();
1718 // Check that the interceptor got called as expected.
1719 EXPECT_TRUE(interceptor()->did_cancel_then_restart_main());
1720 EXPECT_FALSE(interceptor()->did_intercept_final());
1722 // Check that we see a canceled request.
1723 EXPECT_FALSE(req
->status().is_success());
1724 EXPECT_EQ(URLRequestStatus::CANCELED
, req
->status().status());
1727 // "Normal" LoadTimingInfo as returned by a job. Everything is in order, not
1728 // reused. |connect_time_flags| is used to indicate if there should be dns
1729 // or SSL times, and |used_proxy| is used for proxy times.
1730 LoadTimingInfo
NormalLoadTimingInfo(base::TimeTicks now
,
1731 int connect_time_flags
,
1733 LoadTimingInfo load_timing
;
1734 load_timing
.socket_log_id
= 1;
1737 load_timing
.proxy_resolve_start
= now
+ base::TimeDelta::FromDays(1);
1738 load_timing
.proxy_resolve_end
= now
+ base::TimeDelta::FromDays(2);
1741 LoadTimingInfo::ConnectTiming
& connect_timing
= load_timing
.connect_timing
;
1742 if (connect_time_flags
& CONNECT_TIMING_HAS_DNS_TIMES
) {
1743 connect_timing
.dns_start
= now
+ base::TimeDelta::FromDays(3);
1744 connect_timing
.dns_end
= now
+ base::TimeDelta::FromDays(4);
1746 connect_timing
.connect_start
= now
+ base::TimeDelta::FromDays(5);
1747 if (connect_time_flags
& CONNECT_TIMING_HAS_SSL_TIMES
) {
1748 connect_timing
.ssl_start
= now
+ base::TimeDelta::FromDays(6);
1749 connect_timing
.ssl_end
= now
+ base::TimeDelta::FromDays(7);
1751 connect_timing
.connect_end
= now
+ base::TimeDelta::FromDays(8);
1753 load_timing
.send_start
= now
+ base::TimeDelta::FromDays(9);
1754 load_timing
.send_end
= now
+ base::TimeDelta::FromDays(10);
1755 load_timing
.receive_headers_end
= now
+ base::TimeDelta::FromDays(11);
1759 // Same as above, but in the case of a reused socket.
1760 LoadTimingInfo
NormalLoadTimingInfoReused(base::TimeTicks now
,
1762 LoadTimingInfo load_timing
;
1763 load_timing
.socket_log_id
= 1;
1764 load_timing
.socket_reused
= true;
1767 load_timing
.proxy_resolve_start
= now
+ base::TimeDelta::FromDays(1);
1768 load_timing
.proxy_resolve_end
= now
+ base::TimeDelta::FromDays(2);
1771 load_timing
.send_start
= now
+ base::TimeDelta::FromDays(9);
1772 load_timing
.send_end
= now
+ base::TimeDelta::FromDays(10);
1773 load_timing
.receive_headers_end
= now
+ base::TimeDelta::FromDays(11);
1777 LoadTimingInfo
RunURLRequestInterceptorLoadTimingTest(
1778 const LoadTimingInfo
& job_load_timing
,
1779 const URLRequestContext
& context
,
1780 MockURLRequestInterceptor
* interceptor
) {
1781 interceptor
->set_intercept_main_request(true);
1782 interceptor
->set_main_request_load_timing_info(job_load_timing
);
1784 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
1785 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, nullptr));
1787 base::RunLoop().Run();
1789 LoadTimingInfo resulting_load_timing
;
1790 req
->GetLoadTimingInfo(&resulting_load_timing
);
1792 // None of these should be modified by the URLRequest.
1793 EXPECT_EQ(job_load_timing
.socket_reused
, resulting_load_timing
.socket_reused
);
1794 EXPECT_EQ(job_load_timing
.socket_log_id
, resulting_load_timing
.socket_log_id
);
1795 EXPECT_EQ(job_load_timing
.send_start
, resulting_load_timing
.send_start
);
1796 EXPECT_EQ(job_load_timing
.send_end
, resulting_load_timing
.send_end
);
1797 EXPECT_EQ(job_load_timing
.receive_headers_end
,
1798 resulting_load_timing
.receive_headers_end
);
1800 return resulting_load_timing
;
1803 // Basic test that the intercept + load timing tests work.
1804 TEST_F(URLRequestInterceptorTest
, InterceptLoadTiming
) {
1805 base::TimeTicks now
= base::TimeTicks::Now();
1806 LoadTimingInfo job_load_timing
=
1807 NormalLoadTimingInfo(now
, CONNECT_TIMING_HAS_DNS_TIMES
, false);
1809 LoadTimingInfo load_timing_result
=
1810 RunURLRequestInterceptorLoadTimingTest(
1811 job_load_timing
, default_context(), interceptor());
1813 // Nothing should have been changed by the URLRequest.
1814 EXPECT_EQ(job_load_timing
.proxy_resolve_start
,
1815 load_timing_result
.proxy_resolve_start
);
1816 EXPECT_EQ(job_load_timing
.proxy_resolve_end
,
1817 load_timing_result
.proxy_resolve_end
);
1818 EXPECT_EQ(job_load_timing
.connect_timing
.dns_start
,
1819 load_timing_result
.connect_timing
.dns_start
);
1820 EXPECT_EQ(job_load_timing
.connect_timing
.dns_end
,
1821 load_timing_result
.connect_timing
.dns_end
);
1822 EXPECT_EQ(job_load_timing
.connect_timing
.connect_start
,
1823 load_timing_result
.connect_timing
.connect_start
);
1824 EXPECT_EQ(job_load_timing
.connect_timing
.connect_end
,
1825 load_timing_result
.connect_timing
.connect_end
);
1826 EXPECT_EQ(job_load_timing
.connect_timing
.ssl_start
,
1827 load_timing_result
.connect_timing
.ssl_start
);
1828 EXPECT_EQ(job_load_timing
.connect_timing
.ssl_end
,
1829 load_timing_result
.connect_timing
.ssl_end
);
1831 // Redundant sanity check.
1832 TestLoadTimingNotReused(load_timing_result
, CONNECT_TIMING_HAS_DNS_TIMES
);
1835 // Another basic test, with proxy and SSL times, but no DNS times.
1836 TEST_F(URLRequestInterceptorTest
, InterceptLoadTimingProxy
) {
1837 base::TimeTicks now
= base::TimeTicks::Now();
1838 LoadTimingInfo job_load_timing
=
1839 NormalLoadTimingInfo(now
, CONNECT_TIMING_HAS_SSL_TIMES
, true);
1841 LoadTimingInfo load_timing_result
=
1842 RunURLRequestInterceptorLoadTimingTest(
1843 job_load_timing
, default_context(), interceptor());
1845 // Nothing should have been changed by the URLRequest.
1846 EXPECT_EQ(job_load_timing
.proxy_resolve_start
,
1847 load_timing_result
.proxy_resolve_start
);
1848 EXPECT_EQ(job_load_timing
.proxy_resolve_end
,
1849 load_timing_result
.proxy_resolve_end
);
1850 EXPECT_EQ(job_load_timing
.connect_timing
.dns_start
,
1851 load_timing_result
.connect_timing
.dns_start
);
1852 EXPECT_EQ(job_load_timing
.connect_timing
.dns_end
,
1853 load_timing_result
.connect_timing
.dns_end
);
1854 EXPECT_EQ(job_load_timing
.connect_timing
.connect_start
,
1855 load_timing_result
.connect_timing
.connect_start
);
1856 EXPECT_EQ(job_load_timing
.connect_timing
.connect_end
,
1857 load_timing_result
.connect_timing
.connect_end
);
1858 EXPECT_EQ(job_load_timing
.connect_timing
.ssl_start
,
1859 load_timing_result
.connect_timing
.ssl_start
);
1860 EXPECT_EQ(job_load_timing
.connect_timing
.ssl_end
,
1861 load_timing_result
.connect_timing
.ssl_end
);
1863 // Redundant sanity check.
1864 TestLoadTimingNotReusedWithProxy(load_timing_result
,
1865 CONNECT_TIMING_HAS_SSL_TIMES
);
1868 // Make sure that URLRequest correctly adjusts proxy times when they're before
1869 // |request_start|, due to already having a connected socket. This happens in
1870 // the case of reusing a SPDY session. The connected socket is not considered
1871 // reused in this test (May be a preconnect).
1873 // To mix things up from the test above, assumes DNS times but no SSL times.
1874 TEST_F(URLRequestInterceptorTest
, InterceptLoadTimingEarlyProxyResolution
) {
1875 base::TimeTicks now
= base::TimeTicks::Now();
1876 LoadTimingInfo job_load_timing
=
1877 NormalLoadTimingInfo(now
, CONNECT_TIMING_HAS_DNS_TIMES
, true);
1878 job_load_timing
.proxy_resolve_start
= now
- base::TimeDelta::FromDays(6);
1879 job_load_timing
.proxy_resolve_end
= now
- base::TimeDelta::FromDays(5);
1880 job_load_timing
.connect_timing
.dns_start
= now
- base::TimeDelta::FromDays(4);
1881 job_load_timing
.connect_timing
.dns_end
= now
- base::TimeDelta::FromDays(3);
1882 job_load_timing
.connect_timing
.connect_start
=
1883 now
- base::TimeDelta::FromDays(2);
1884 job_load_timing
.connect_timing
.connect_end
=
1885 now
- base::TimeDelta::FromDays(1);
1887 LoadTimingInfo load_timing_result
=
1888 RunURLRequestInterceptorLoadTimingTest(
1889 job_load_timing
, default_context(), interceptor());
1891 // Proxy times, connect times, and DNS times should all be replaced with
1893 EXPECT_EQ(load_timing_result
.request_start
,
1894 load_timing_result
.proxy_resolve_start
);
1895 EXPECT_EQ(load_timing_result
.request_start
,
1896 load_timing_result
.proxy_resolve_end
);
1897 EXPECT_EQ(load_timing_result
.request_start
,
1898 load_timing_result
.connect_timing
.dns_start
);
1899 EXPECT_EQ(load_timing_result
.request_start
,
1900 load_timing_result
.connect_timing
.dns_end
);
1901 EXPECT_EQ(load_timing_result
.request_start
,
1902 load_timing_result
.connect_timing
.connect_start
);
1903 EXPECT_EQ(load_timing_result
.request_start
,
1904 load_timing_result
.connect_timing
.connect_end
);
1906 // Other times should have been left null.
1907 TestLoadTimingNotReusedWithProxy(load_timing_result
,
1908 CONNECT_TIMING_HAS_DNS_TIMES
);
1911 // Same as above, but in the reused case.
1912 TEST_F(URLRequestInterceptorTest
,
1913 InterceptLoadTimingEarlyProxyResolutionReused
) {
1914 base::TimeTicks now
= base::TimeTicks::Now();
1915 LoadTimingInfo job_load_timing
= NormalLoadTimingInfoReused(now
, true);
1916 job_load_timing
.proxy_resolve_start
= now
- base::TimeDelta::FromDays(4);
1917 job_load_timing
.proxy_resolve_end
= now
- base::TimeDelta::FromDays(3);
1919 LoadTimingInfo load_timing_result
=
1920 RunURLRequestInterceptorLoadTimingTest(
1921 job_load_timing
, default_context(), interceptor());
1923 // Proxy times and connect times should all be replaced with request_start.
1924 EXPECT_EQ(load_timing_result
.request_start
,
1925 load_timing_result
.proxy_resolve_start
);
1926 EXPECT_EQ(load_timing_result
.request_start
,
1927 load_timing_result
.proxy_resolve_end
);
1929 // Other times should have been left null.
1930 TestLoadTimingReusedWithProxy(load_timing_result
);
1933 // Make sure that URLRequest correctly adjusts connect times when they're before
1934 // |request_start|, due to reusing a connected socket. The connected socket is
1935 // not considered reused in this test (May be a preconnect).
1937 // To mix things up, the request has SSL times, but no DNS times.
1938 TEST_F(URLRequestInterceptorTest
, InterceptLoadTimingEarlyConnect
) {
1939 base::TimeTicks now
= base::TimeTicks::Now();
1940 LoadTimingInfo job_load_timing
=
1941 NormalLoadTimingInfo(now
, CONNECT_TIMING_HAS_SSL_TIMES
, false);
1942 job_load_timing
.connect_timing
.connect_start
=
1943 now
- base::TimeDelta::FromDays(1);
1944 job_load_timing
.connect_timing
.ssl_start
= now
- base::TimeDelta::FromDays(2);
1945 job_load_timing
.connect_timing
.ssl_end
= now
- base::TimeDelta::FromDays(3);
1946 job_load_timing
.connect_timing
.connect_end
=
1947 now
- base::TimeDelta::FromDays(4);
1949 LoadTimingInfo load_timing_result
=
1950 RunURLRequestInterceptorLoadTimingTest(
1951 job_load_timing
, default_context(), interceptor());
1953 // Connect times, and SSL times should be replaced with request_start.
1954 EXPECT_EQ(load_timing_result
.request_start
,
1955 load_timing_result
.connect_timing
.connect_start
);
1956 EXPECT_EQ(load_timing_result
.request_start
,
1957 load_timing_result
.connect_timing
.ssl_start
);
1958 EXPECT_EQ(load_timing_result
.request_start
,
1959 load_timing_result
.connect_timing
.ssl_end
);
1960 EXPECT_EQ(load_timing_result
.request_start
,
1961 load_timing_result
.connect_timing
.connect_end
);
1963 // Other times should have been left null.
1964 TestLoadTimingNotReused(load_timing_result
, CONNECT_TIMING_HAS_SSL_TIMES
);
1967 // Make sure that URLRequest correctly adjusts connect times when they're before
1968 // |request_start|, due to reusing a connected socket in the case that there
1969 // are also proxy times. The connected socket is not considered reused in this
1970 // test (May be a preconnect).
1972 // In this test, there are no SSL or DNS times.
1973 TEST_F(URLRequestInterceptorTest
, InterceptLoadTimingEarlyConnectWithProxy
) {
1974 base::TimeTicks now
= base::TimeTicks::Now();
1975 LoadTimingInfo job_load_timing
=
1976 NormalLoadTimingInfo(now
, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY
, true);
1977 job_load_timing
.connect_timing
.connect_start
=
1978 now
- base::TimeDelta::FromDays(1);
1979 job_load_timing
.connect_timing
.connect_end
=
1980 now
- base::TimeDelta::FromDays(2);
1982 LoadTimingInfo load_timing_result
=
1983 RunURLRequestInterceptorLoadTimingTest(
1984 job_load_timing
, default_context(), interceptor());
1986 // Connect times should be replaced with proxy_resolve_end.
1987 EXPECT_EQ(load_timing_result
.proxy_resolve_end
,
1988 load_timing_result
.connect_timing
.connect_start
);
1989 EXPECT_EQ(load_timing_result
.proxy_resolve_end
,
1990 load_timing_result
.connect_timing
.connect_end
);
1992 // Other times should have been left null.
1993 TestLoadTimingNotReusedWithProxy(load_timing_result
,
1994 CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY
);
1997 // Check that two different URL requests have different identifiers.
1998 TEST_F(URLRequestTest
, Identifiers
) {
2000 TestURLRequestContext context
;
2001 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
2002 GURL("http://example.com"), DEFAULT_PRIORITY
, &d
, NULL
));
2003 scoped_ptr
<URLRequest
> other_req(context
.CreateRequest(
2004 GURL("http://example.com"), DEFAULT_PRIORITY
, &d
, NULL
));
2006 ASSERT_NE(req
->identifier(), other_req
->identifier());
2009 // Check that a failure to connect to the proxy is reported to the network
2011 TEST_F(URLRequestTest
, NetworkDelegateProxyError
) {
2012 MockHostResolver host_resolver
;
2013 host_resolver
.rules()->AddSimulatedFailure("*");
2015 TestNetworkDelegate network_delegate
; // Must outlive URLRequests.
2016 TestURLRequestContextWithProxy
context("myproxy:70", &network_delegate
);
2019 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
2020 GURL("http://example.com"), DEFAULT_PRIORITY
, &d
, NULL
));
2021 req
->set_method("GET");
2024 base::RunLoop().Run();
2026 // Check we see a failed request.
2027 EXPECT_FALSE(req
->status().is_success());
2028 // The proxy server is not set before failure.
2029 EXPECT_TRUE(req
->proxy_server().IsEmpty());
2030 EXPECT_EQ(URLRequestStatus::FAILED
, req
->status().status());
2031 EXPECT_EQ(ERR_PROXY_CONNECTION_FAILED
, req
->status().error());
2033 EXPECT_EQ(1, network_delegate
.error_count());
2034 EXPECT_EQ(ERR_PROXY_CONNECTION_FAILED
, network_delegate
.last_error());
2035 EXPECT_EQ(1, network_delegate
.completed_requests());
2038 // Make sure that NetworkDelegate::NotifyCompleted is called if
2039 // content is empty.
2040 TEST_F(URLRequestTest
, RequestCompletionForEmptyResponse
) {
2042 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2043 GURL("data:,"), DEFAULT_PRIORITY
, &d
, NULL
));
2045 base::RunLoop().Run();
2046 EXPECT_EQ("", d
.data_received());
2047 EXPECT_EQ(1, default_network_delegate_
.completed_requests());
2050 // Make sure that SetPriority actually sets the URLRequest's priority
2051 // correctly, both before and after start.
2052 TEST_F(URLRequestTest
, SetPriorityBasic
) {
2054 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2055 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, NULL
));
2056 EXPECT_EQ(DEFAULT_PRIORITY
, req
->priority());
2058 req
->SetPriority(LOW
);
2059 EXPECT_EQ(LOW
, req
->priority());
2062 EXPECT_EQ(LOW
, req
->priority());
2064 req
->SetPriority(MEDIUM
);
2065 EXPECT_EQ(MEDIUM
, req
->priority());
2068 // Make sure that URLRequest calls SetPriority on a job before calling
2070 TEST_F(URLRequestTest
, SetJobPriorityBeforeJobStart
) {
2072 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2073 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, NULL
));
2074 EXPECT_EQ(DEFAULT_PRIORITY
, req
->priority());
2076 scoped_refptr
<URLRequestTestJob
> job
=
2077 new URLRequestTestJob(req
.get(), &default_network_delegate_
);
2078 AddTestInterceptor()->set_main_intercept_job(job
.get());
2079 EXPECT_EQ(DEFAULT_PRIORITY
, job
->priority());
2081 req
->SetPriority(LOW
);
2084 EXPECT_EQ(LOW
, job
->priority());
2087 // Make sure that URLRequest passes on its priority updates to its
2089 TEST_F(URLRequestTest
, SetJobPriority
) {
2091 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2092 GURL("http://test_intercept/foo"), DEFAULT_PRIORITY
, &d
, NULL
));
2094 scoped_refptr
<URLRequestTestJob
> job
=
2095 new URLRequestTestJob(req
.get(), &default_network_delegate_
);
2096 AddTestInterceptor()->set_main_intercept_job(job
.get());
2098 req
->SetPriority(LOW
);
2100 EXPECT_EQ(LOW
, job
->priority());
2102 req
->SetPriority(MEDIUM
);
2103 EXPECT_EQ(MEDIUM
, req
->priority());
2104 EXPECT_EQ(MEDIUM
, job
->priority());
2107 // Setting the IGNORE_LIMITS load flag should be okay if the priority
2108 // is MAXIMUM_PRIORITY.
2109 TEST_F(URLRequestTest
, PriorityIgnoreLimits
) {
2111 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2112 GURL("http://test_intercept/foo"), MAXIMUM_PRIORITY
, &d
, NULL
));
2113 EXPECT_EQ(MAXIMUM_PRIORITY
, req
->priority());
2115 scoped_refptr
<URLRequestTestJob
> job
=
2116 new URLRequestTestJob(req
.get(), &default_network_delegate_
);
2117 AddTestInterceptor()->set_main_intercept_job(job
.get());
2119 req
->SetLoadFlags(LOAD_IGNORE_LIMITS
);
2120 EXPECT_EQ(MAXIMUM_PRIORITY
, req
->priority());
2122 req
->SetPriority(MAXIMUM_PRIORITY
);
2123 EXPECT_EQ(MAXIMUM_PRIORITY
, req
->priority());
2126 EXPECT_EQ(MAXIMUM_PRIORITY
, req
->priority());
2127 EXPECT_EQ(MAXIMUM_PRIORITY
, job
->priority());
2130 // TODO(droger): Support SpawnedTestServer on iOS (see http://crbug.com/148666).
2131 #if !defined(OS_IOS)
2132 // A subclass of SpawnedTestServer that uses a statically-configured hostname.
2133 // This is to work around mysterious failures in chrome_frame_net_tests. See:
2134 // http://crbug.com/114369
2135 // TODO(erikwright): remove or update as needed; see http://crbug.com/334634.
2136 class LocalHttpTestServer
: public SpawnedTestServer
{
2138 explicit LocalHttpTestServer(const base::FilePath
& document_root
)
2139 : SpawnedTestServer(SpawnedTestServer::TYPE_HTTP
,
2140 ScopedCustomUrlRequestTestHttpHost::value(),
2142 LocalHttpTestServer()
2143 : SpawnedTestServer(SpawnedTestServer::TYPE_HTTP
,
2144 ScopedCustomUrlRequestTestHttpHost::value(),
2145 base::FilePath()) {}
2148 TEST_F(URLRequestTest
, DelayedCookieCallback
) {
2149 LocalHttpTestServer test_server
;
2150 ASSERT_TRUE(test_server
.Start());
2152 TestURLRequestContext context
;
2153 scoped_refptr
<DelayedCookieMonster
> delayed_cm
=
2154 new DelayedCookieMonster();
2155 scoped_refptr
<CookieStore
> cookie_store
= delayed_cm
;
2156 context
.set_cookie_store(delayed_cm
.get());
2160 TestNetworkDelegate network_delegate
;
2161 context
.set_network_delegate(&network_delegate
);
2163 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
2164 test_server
.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY
,
2167 base::RunLoop().Run();
2168 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2169 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2170 EXPECT_EQ(1, network_delegate
.set_cookie_count());
2173 // Verify that the cookie is set.
2175 TestNetworkDelegate network_delegate
;
2176 context
.set_network_delegate(&network_delegate
);
2178 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
2179 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2181 base::RunLoop().Run();
2183 EXPECT_TRUE(d
.data_received().find("CookieToNotSend=1")
2184 != std::string::npos
);
2185 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2186 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2190 TEST_F(URLRequestTest
, DoNotSendCookies
) {
2191 LocalHttpTestServer test_server
;
2192 ASSERT_TRUE(test_server
.Start());
2196 TestNetworkDelegate network_delegate
;
2197 default_context_
.set_network_delegate(&network_delegate
);
2199 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2200 test_server
.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY
,
2203 base::RunLoop().Run();
2204 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2205 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2208 // Verify that the cookie is set.
2210 TestNetworkDelegate network_delegate
;
2211 default_context_
.set_network_delegate(&network_delegate
);
2213 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2214 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2216 base::RunLoop().Run();
2218 EXPECT_TRUE(d
.data_received().find("CookieToNotSend=1")
2219 != std::string::npos
);
2220 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2221 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2224 // Verify that the cookie isn't sent when LOAD_DO_NOT_SEND_COOKIES is set.
2226 TestNetworkDelegate network_delegate
;
2227 default_context_
.set_network_delegate(&network_delegate
);
2229 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2230 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2231 req
->SetLoadFlags(LOAD_DO_NOT_SEND_COOKIES
);
2233 base::RunLoop().Run();
2235 EXPECT_TRUE(d
.data_received().find("Cookie: CookieToNotSend=1")
2236 == std::string::npos
);
2238 // LOAD_DO_NOT_SEND_COOKIES does not trigger OnGetCookies.
2239 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2240 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2244 TEST_F(URLRequestTest
, DoNotSaveCookies
) {
2245 LocalHttpTestServer test_server
;
2246 ASSERT_TRUE(test_server
.Start());
2250 TestNetworkDelegate network_delegate
;
2251 default_context_
.set_network_delegate(&network_delegate
);
2253 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2254 test_server
.GetURL("set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY
,
2257 base::RunLoop().Run();
2259 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2260 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2261 EXPECT_EQ(1, network_delegate
.set_cookie_count());
2264 // Try to set-up another cookie and update the previous cookie.
2266 TestNetworkDelegate network_delegate
;
2267 default_context_
.set_network_delegate(&network_delegate
);
2269 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2270 test_server
.GetURL("set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"),
2271 DEFAULT_PRIORITY
, &d
, NULL
));
2272 req
->SetLoadFlags(LOAD_DO_NOT_SAVE_COOKIES
);
2275 base::RunLoop().Run();
2277 // LOAD_DO_NOT_SAVE_COOKIES does not trigger OnSetCookie.
2278 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2279 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2280 EXPECT_EQ(0, network_delegate
.set_cookie_count());
2283 // Verify the cookies weren't saved or updated.
2285 TestNetworkDelegate network_delegate
;
2286 default_context_
.set_network_delegate(&network_delegate
);
2288 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2289 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2291 base::RunLoop().Run();
2293 EXPECT_TRUE(d
.data_received().find("CookieToNotSave=1")
2294 == std::string::npos
);
2295 EXPECT_TRUE(d
.data_received().find("CookieToNotUpdate=2")
2296 != std::string::npos
);
2298 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2299 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2300 EXPECT_EQ(0, network_delegate
.set_cookie_count());
2304 TEST_F(URLRequestTest
, DoNotSendCookies_ViaPolicy
) {
2305 LocalHttpTestServer test_server
;
2306 ASSERT_TRUE(test_server
.Start());
2310 TestNetworkDelegate network_delegate
;
2311 default_context_
.set_network_delegate(&network_delegate
);
2313 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2314 test_server
.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY
,
2317 base::RunLoop().Run();
2319 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2320 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2323 // Verify that the cookie is set.
2325 TestNetworkDelegate network_delegate
;
2326 default_context_
.set_network_delegate(&network_delegate
);
2328 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2329 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2331 base::RunLoop().Run();
2333 EXPECT_TRUE(d
.data_received().find("CookieToNotSend=1")
2334 != std::string::npos
);
2336 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2337 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2340 // Verify that the cookie isn't sent.
2342 TestNetworkDelegate network_delegate
;
2343 default_context_
.set_network_delegate(&network_delegate
);
2345 network_delegate
.set_cookie_options(TestNetworkDelegate::NO_GET_COOKIES
);
2346 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2347 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2349 base::RunLoop().Run();
2351 EXPECT_TRUE(d
.data_received().find("Cookie: CookieToNotSend=1")
2352 == std::string::npos
);
2354 EXPECT_EQ(1, network_delegate
.blocked_get_cookies_count());
2355 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2359 TEST_F(URLRequestTest
, DoNotSaveCookies_ViaPolicy
) {
2360 LocalHttpTestServer test_server
;
2361 ASSERT_TRUE(test_server
.Start());
2365 TestNetworkDelegate network_delegate
;
2366 default_context_
.set_network_delegate(&network_delegate
);
2368 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2369 test_server
.GetURL("set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY
,
2372 base::RunLoop().Run();
2374 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2375 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2378 // Try to set-up another cookie and update the previous cookie.
2380 TestNetworkDelegate network_delegate
;
2381 default_context_
.set_network_delegate(&network_delegate
);
2383 network_delegate
.set_cookie_options(TestNetworkDelegate::NO_SET_COOKIE
);
2384 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2385 test_server
.GetURL("set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"),
2386 DEFAULT_PRIORITY
, &d
, NULL
));
2389 base::RunLoop().Run();
2391 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2392 EXPECT_EQ(2, network_delegate
.blocked_set_cookie_count());
2395 // Verify the cookies weren't saved or updated.
2397 TestNetworkDelegate network_delegate
;
2398 default_context_
.set_network_delegate(&network_delegate
);
2400 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2401 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2403 base::RunLoop().Run();
2405 EXPECT_TRUE(d
.data_received().find("CookieToNotSave=1")
2406 == std::string::npos
);
2407 EXPECT_TRUE(d
.data_received().find("CookieToNotUpdate=2")
2408 != std::string::npos
);
2410 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2411 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2415 TEST_F(URLRequestTest
, DoNotSaveEmptyCookies
) {
2416 LocalHttpTestServer test_server
;
2417 ASSERT_TRUE(test_server
.Start());
2419 // Set up an empty cookie.
2421 TestNetworkDelegate network_delegate
;
2422 default_context_
.set_network_delegate(&network_delegate
);
2424 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2425 test_server
.GetURL("set-cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2427 base::RunLoop().Run();
2429 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2430 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2431 EXPECT_EQ(0, network_delegate
.set_cookie_count());
2435 TEST_F(URLRequestTest
, DoNotSendCookies_ViaPolicy_Async
) {
2436 LocalHttpTestServer test_server
;
2437 ASSERT_TRUE(test_server
.Start());
2441 TestNetworkDelegate network_delegate
;
2442 default_context_
.set_network_delegate(&network_delegate
);
2444 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2445 test_server
.GetURL("set-cookie?CookieToNotSend=1"), DEFAULT_PRIORITY
,
2448 base::RunLoop().Run();
2450 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2451 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2454 // Verify that the cookie is set.
2456 TestNetworkDelegate network_delegate
;
2457 default_context_
.set_network_delegate(&network_delegate
);
2459 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2460 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2462 base::RunLoop().Run();
2464 EXPECT_TRUE(d
.data_received().find("CookieToNotSend=1")
2465 != std::string::npos
);
2467 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2468 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2471 // Verify that the cookie isn't sent.
2473 TestNetworkDelegate network_delegate
;
2474 default_context_
.set_network_delegate(&network_delegate
);
2476 network_delegate
.set_cookie_options(TestNetworkDelegate::NO_GET_COOKIES
);
2477 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2478 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2480 base::RunLoop().Run();
2482 EXPECT_TRUE(d
.data_received().find("Cookie: CookieToNotSend=1")
2483 == std::string::npos
);
2485 EXPECT_EQ(1, network_delegate
.blocked_get_cookies_count());
2486 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2490 TEST_F(URLRequestTest
, DoNotSaveCookies_ViaPolicy_Async
) {
2491 LocalHttpTestServer test_server
;
2492 ASSERT_TRUE(test_server
.Start());
2496 TestNetworkDelegate network_delegate
;
2497 default_context_
.set_network_delegate(&network_delegate
);
2499 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2500 test_server
.GetURL("set-cookie?CookieToNotUpdate=2"), DEFAULT_PRIORITY
,
2503 base::RunLoop().Run();
2505 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2506 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2509 // Try to set-up another cookie and update the previous cookie.
2511 TestNetworkDelegate network_delegate
;
2512 default_context_
.set_network_delegate(&network_delegate
);
2514 network_delegate
.set_cookie_options(TestNetworkDelegate::NO_SET_COOKIE
);
2515 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2516 test_server
.GetURL("set-cookie?CookieToNotSave=1&CookieToNotUpdate=1"),
2517 DEFAULT_PRIORITY
, &d
, NULL
));
2520 base::RunLoop().Run();
2522 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2523 EXPECT_EQ(2, network_delegate
.blocked_set_cookie_count());
2526 // Verify the cookies weren't saved or updated.
2528 TestNetworkDelegate network_delegate
;
2529 default_context_
.set_network_delegate(&network_delegate
);
2531 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2532 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2534 base::RunLoop().Run();
2536 EXPECT_TRUE(d
.data_received().find("CookieToNotSave=1")
2537 == std::string::npos
);
2538 EXPECT_TRUE(d
.data_received().find("CookieToNotUpdate=2")
2539 != std::string::npos
);
2541 EXPECT_EQ(0, network_delegate
.blocked_get_cookies_count());
2542 EXPECT_EQ(0, network_delegate
.blocked_set_cookie_count());
2546 // FixedDateNetworkDelegate swaps out the server's HTTP Date response header
2547 // value for the |fixed_date| argument given to the constructor.
2548 class FixedDateNetworkDelegate
: public TestNetworkDelegate
{
2550 explicit FixedDateNetworkDelegate(const std::string
& fixed_date
)
2551 : fixed_date_(fixed_date
) {}
2552 ~FixedDateNetworkDelegate() override
{}
2554 // NetworkDelegate implementation
2555 int OnHeadersReceived(
2556 URLRequest
* request
,
2557 const CompletionCallback
& callback
,
2558 const HttpResponseHeaders
* original_response_headers
,
2559 scoped_refptr
<HttpResponseHeaders
>* override_response_headers
,
2560 GURL
* allowed_unsafe_redirect_url
) override
;
2563 std::string fixed_date_
;
2565 DISALLOW_COPY_AND_ASSIGN(FixedDateNetworkDelegate
);
2568 int FixedDateNetworkDelegate::OnHeadersReceived(
2569 URLRequest
* request
,
2570 const CompletionCallback
& callback
,
2571 const HttpResponseHeaders
* original_response_headers
,
2572 scoped_refptr
<HttpResponseHeaders
>* override_response_headers
,
2573 GURL
* allowed_unsafe_redirect_url
) {
2574 HttpResponseHeaders
* new_response_headers
=
2575 new HttpResponseHeaders(original_response_headers
->raw_headers());
2577 new_response_headers
->RemoveHeader("Date");
2578 new_response_headers
->AddHeader("Date: " + fixed_date_
);
2580 *override_response_headers
= new_response_headers
;
2581 return TestNetworkDelegate::OnHeadersReceived(request
,
2583 original_response_headers
,
2584 override_response_headers
,
2585 allowed_unsafe_redirect_url
);
2588 // Test that cookie expiration times are adjusted for server/client clock
2589 // skew and that we handle incorrect timezone specifier "UTC" in HTTP Date
2590 // headers by defaulting to GMT. (crbug.com/135131)
2591 TEST_F(URLRequestTest
, AcceptClockSkewCookieWithWrongDateTimezone
) {
2592 LocalHttpTestServer test_server
;
2593 ASSERT_TRUE(test_server
.Start());
2595 // Set up an expired cookie.
2597 TestNetworkDelegate network_delegate
;
2598 default_context_
.set_network_delegate(&network_delegate
);
2600 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2602 "set-cookie?StillGood=1;expires=Mon,18-Apr-1977,22:50:13,GMT"),
2603 DEFAULT_PRIORITY
, &d
, NULL
));
2605 base::RunLoop().Run();
2607 // Verify that the cookie is not set.
2609 TestNetworkDelegate network_delegate
;
2610 default_context_
.set_network_delegate(&network_delegate
);
2612 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2613 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2615 base::RunLoop().Run();
2617 EXPECT_TRUE(d
.data_received().find("StillGood=1") == std::string::npos
);
2619 // Set up a cookie with clock skew and "UTC" HTTP Date timezone specifier.
2621 FixedDateNetworkDelegate
network_delegate("18-Apr-1977 22:49:13 UTC");
2622 default_context_
.set_network_delegate(&network_delegate
);
2624 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2626 "set-cookie?StillGood=1;expires=Mon,18-Apr-1977,22:50:13,GMT"),
2627 DEFAULT_PRIORITY
, &d
, NULL
));
2629 base::RunLoop().Run();
2631 // Verify that the cookie is set.
2633 TestNetworkDelegate network_delegate
;
2634 default_context_
.set_network_delegate(&network_delegate
);
2636 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2637 test_server
.GetURL("echoheader?Cookie"), DEFAULT_PRIORITY
, &d
, NULL
));
2639 base::RunLoop().Run();
2641 EXPECT_TRUE(d
.data_received().find("StillGood=1") != std::string::npos
);
2646 // Check that it is impossible to change the referrer in the extra headers of
2648 TEST_F(URLRequestTest
, DoNotOverrideReferrer
) {
2649 LocalHttpTestServer test_server
;
2650 ASSERT_TRUE(test_server
.Start());
2652 // If extra headers contain referer and the request contains a referer,
2653 // only the latter shall be respected.
2656 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2657 test_server
.GetURL("echoheader?Referer"), DEFAULT_PRIORITY
, &d
, NULL
));
2658 req
->SetReferrer("http://foo.com/");
2660 HttpRequestHeaders headers
;
2661 headers
.SetHeader(HttpRequestHeaders::kReferer
, "http://bar.com/");
2662 req
->SetExtraRequestHeaders(headers
);
2665 base::RunLoop().Run();
2667 EXPECT_EQ("http://foo.com/", d
.data_received());
2670 // If extra headers contain a referer but the request does not, no referer
2671 // shall be sent in the header.
2674 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2675 test_server
.GetURL("echoheader?Referer"), DEFAULT_PRIORITY
, &d
, NULL
));
2677 HttpRequestHeaders headers
;
2678 headers
.SetHeader(HttpRequestHeaders::kReferer
, "http://bar.com/");
2679 req
->SetExtraRequestHeaders(headers
);
2680 req
->SetLoadFlags(LOAD_VALIDATE_CACHE
);
2683 base::RunLoop().Run();
2685 EXPECT_EQ("None", d
.data_received());
2689 class URLRequestTestHTTP
: public URLRequestTest
{
2691 URLRequestTestHTTP()
2692 : test_server_(base::FilePath(FILE_PATH_LITERAL(
2693 "net/data/url_request_unittest"))) {
2697 // Requests |redirect_url|, which must return a HTTP 3xx redirect.
2698 // |request_method| is the method to use for the initial request.
2699 // |redirect_method| is the method that is expected to be used for the second
2700 // request, after redirection.
2701 // If |include_data| is true, data is uploaded with the request. The
2702 // response body is expected to match it exactly, if and only if
2703 // |request_method| == |redirect_method|.
2704 void HTTPRedirectMethodTest(const GURL
& redirect_url
,
2705 const std::string
& request_method
,
2706 const std::string
& redirect_method
,
2707 bool include_data
) {
2708 static const char kData
[] = "hello world";
2710 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
2711 redirect_url
, DEFAULT_PRIORITY
, &d
, NULL
));
2712 req
->set_method(request_method
);
2714 req
->set_upload(CreateSimpleUploadData(kData
));
2715 HttpRequestHeaders headers
;
2716 headers
.SetHeader(HttpRequestHeaders::kContentLength
,
2717 base::UintToString(arraysize(kData
) - 1));
2718 req
->SetExtraRequestHeaders(headers
);
2721 base::RunLoop().Run();
2722 EXPECT_EQ(redirect_method
, req
->method());
2723 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
2724 EXPECT_EQ(OK
, req
->status().error());
2726 if (request_method
== redirect_method
) {
2727 EXPECT_EQ(kData
, d
.data_received());
2729 EXPECT_NE(kData
, d
.data_received());
2733 LOG(WARNING
) << "Request method was: " << request_method
;
2736 void HTTPUploadDataOperationTest(const std::string
& method
) {
2737 const int kMsgSize
= 20000; // multiple of 10
2738 const int kIterations
= 50;
2739 char* uploadBytes
= new char[kMsgSize
+1];
2740 char* ptr
= uploadBytes
;
2742 for (int idx
= 0; idx
< kMsgSize
/10; idx
++) {
2743 memcpy(ptr
, "----------", 10);
2745 if (idx
% 100 == 0) {
2752 uploadBytes
[kMsgSize
] = '\0';
2754 for (int i
= 0; i
< kIterations
; ++i
) {
2756 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
2757 test_server_
.GetURL("echo"), DEFAULT_PRIORITY
, &d
, NULL
));
2758 r
->set_method(method
.c_str());
2760 r
->set_upload(CreateSimpleUploadData(uploadBytes
));
2763 EXPECT_TRUE(r
->is_pending());
2765 base::RunLoop().Run();
2767 ASSERT_EQ(1, d
.response_started_count())
2768 << "request failed: " << r
->status().status()
2769 << ", os error: " << r
->status().error();
2771 EXPECT_FALSE(d
.received_data_before_response());
2772 EXPECT_EQ(uploadBytes
, d
.data_received());
2774 delete[] uploadBytes
;
2777 void AddChunksToUpload(URLRequest
* r
) {
2778 r
->AppendChunkToUpload("a", 1, false);
2779 r
->AppendChunkToUpload("bcd", 3, false);
2780 r
->AppendChunkToUpload("this is a longer chunk than before.", 35, false);
2781 r
->AppendChunkToUpload("\r\n\r\n", 4, false);
2782 r
->AppendChunkToUpload("0", 1, false);
2783 r
->AppendChunkToUpload("2323", 4, true);
2786 void VerifyReceivedDataMatchesChunks(URLRequest
* r
, TestDelegate
* d
) {
2787 // This should match the chunks sent by AddChunksToUpload().
2788 const std::string expected_data
=
2789 "abcdthis is a longer chunk than before.\r\n\r\n02323";
2791 ASSERT_EQ(1, d
->response_started_count())
2792 << "request failed: " << r
->status().status()
2793 << ", os error: " << r
->status().error();
2795 EXPECT_FALSE(d
->received_data_before_response());
2797 EXPECT_EQ(expected_data
.size(), static_cast<size_t>(d
->bytes_received()));
2798 EXPECT_EQ(expected_data
, d
->data_received());
2801 bool DoManyCookiesRequest(int num_cookies
) {
2803 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
2804 test_server_
.GetURL("set-many-cookies?" +
2805 base::IntToString(num_cookies
)),
2806 DEFAULT_PRIORITY
, &d
, NULL
));
2809 EXPECT_TRUE(r
->is_pending());
2811 base::RunLoop().Run();
2813 bool is_success
= r
->status().is_success();
2816 EXPECT_TRUE(r
->status().error() == ERR_RESPONSE_HEADERS_TOO_BIG
);
2817 // The test server appears to be unable to handle subsequent requests
2818 // after this error is triggered. Force it to restart.
2819 EXPECT_TRUE(test_server_
.Stop());
2820 EXPECT_TRUE(test_server_
.Start());
2826 LocalHttpTestServer
* test_server() {
2827 return &test_server_
;
2831 LocalHttpTestServer test_server_
;
2834 // In this unit test, we're using the HTTPTestServer as a proxy server and
2835 // issuing a CONNECT request with the magic host name "www.redirect.com".
2836 // The HTTPTestServer will return a 302 response, which we should not
2838 TEST_F(URLRequestTestHTTP
, ProxyTunnelRedirectTest
) {
2839 ASSERT_TRUE(test_server_
.Start());
2841 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
2842 TestURLRequestContextWithProxy
context(
2843 test_server_
.host_port_pair().ToString(), &network_delegate
);
2847 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
2848 GURL("https://www.redirect.com/"), DEFAULT_PRIORITY
, &d
, NULL
));
2850 EXPECT_TRUE(r
->is_pending());
2852 base::RunLoop().Run();
2854 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
2855 // The proxy server is not set before failure.
2856 EXPECT_TRUE(r
->proxy_server().IsEmpty());
2857 EXPECT_EQ(ERR_TUNNEL_CONNECTION_FAILED
, r
->status().error());
2858 EXPECT_EQ(1, d
.response_started_count());
2859 // We should not have followed the redirect.
2860 EXPECT_EQ(0, d
.received_redirect_count());
2864 // This is the same as the previous test, but checks that the network delegate
2865 // registers the error.
2866 TEST_F(URLRequestTestHTTP
, NetworkDelegateTunnelConnectionFailed
) {
2867 ASSERT_TRUE(test_server_
.Start());
2869 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
2870 TestURLRequestContextWithProxy
context(
2871 test_server_
.host_port_pair().ToString(), &network_delegate
);
2875 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
2876 GURL("https://www.redirect.com/"), DEFAULT_PRIORITY
, &d
, NULL
));
2878 EXPECT_TRUE(r
->is_pending());
2880 base::RunLoop().Run();
2882 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
2883 // The proxy server is not set before failure.
2884 EXPECT_TRUE(r
->proxy_server().IsEmpty());
2885 EXPECT_EQ(ERR_TUNNEL_CONNECTION_FAILED
, r
->status().error());
2886 EXPECT_EQ(1, d
.response_started_count());
2887 // We should not have followed the redirect.
2888 EXPECT_EQ(0, d
.received_redirect_count());
2890 EXPECT_EQ(1, network_delegate
.error_count());
2891 EXPECT_EQ(ERR_TUNNEL_CONNECTION_FAILED
, network_delegate
.last_error());
2895 // Tests that we can block and asynchronously return OK in various stages.
2896 TEST_F(URLRequestTestHTTP
, NetworkDelegateBlockAsynchronously
) {
2897 static const BlockingNetworkDelegate::Stage blocking_stages
[] = {
2898 BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
,
2899 BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS
,
2900 BlockingNetworkDelegate::ON_HEADERS_RECEIVED
2902 static const size_t blocking_stages_length
= arraysize(blocking_stages
);
2904 ASSERT_TRUE(test_server_
.Start());
2907 BlockingNetworkDelegate
network_delegate(
2908 BlockingNetworkDelegate::USER_CALLBACK
);
2909 network_delegate
.set_block_on(
2910 BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
|
2911 BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS
|
2912 BlockingNetworkDelegate::ON_HEADERS_RECEIVED
);
2914 TestURLRequestContext
context(true);
2915 context
.set_network_delegate(&network_delegate
);
2919 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
2920 test_server_
.GetURL("empty.html"), DEFAULT_PRIORITY
, &d
, NULL
));
2923 for (size_t i
= 0; i
< blocking_stages_length
; ++i
) {
2924 base::RunLoop().Run();
2925 EXPECT_EQ(blocking_stages
[i
],
2926 network_delegate
.stage_blocked_for_callback());
2927 network_delegate
.DoCallback(OK
);
2929 base::RunLoop().Run();
2930 EXPECT_EQ(200, r
->GetResponseCode());
2931 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
2932 EXPECT_EQ(1, network_delegate
.created_requests());
2933 EXPECT_EQ(0, network_delegate
.destroyed_requests());
2935 EXPECT_EQ(1, network_delegate
.destroyed_requests());
2938 // Tests that the network delegate can block and cancel a request.
2939 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelRequest
) {
2940 ASSERT_TRUE(test_server_
.Start());
2943 BlockingNetworkDelegate
network_delegate(
2944 BlockingNetworkDelegate::AUTO_CALLBACK
);
2945 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
);
2946 network_delegate
.set_retval(ERR_EMPTY_RESPONSE
);
2948 TestURLRequestContextWithProxy
context(
2949 test_server_
.host_port_pair().ToString(), &network_delegate
);
2952 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
2953 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
2956 base::RunLoop().Run();
2958 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
2959 // The proxy server is not set before cancellation.
2960 EXPECT_TRUE(r
->proxy_server().IsEmpty());
2961 EXPECT_EQ(ERR_EMPTY_RESPONSE
, r
->status().error());
2962 EXPECT_EQ(1, network_delegate
.created_requests());
2963 EXPECT_EQ(0, network_delegate
.destroyed_requests());
2965 EXPECT_EQ(1, network_delegate
.destroyed_requests());
2968 // Helper function for NetworkDelegateCancelRequestAsynchronously and
2969 // NetworkDelegateCancelRequestSynchronously. Sets up a blocking network
2970 // delegate operating in |block_mode| and a request for |url|. It blocks the
2971 // request in |stage| and cancels it with ERR_BLOCKED_BY_CLIENT.
2972 void NetworkDelegateCancelRequest(BlockingNetworkDelegate::BlockMode block_mode
,
2973 BlockingNetworkDelegate::Stage stage
,
2976 BlockingNetworkDelegate
network_delegate(block_mode
);
2977 network_delegate
.set_retval(ERR_BLOCKED_BY_CLIENT
);
2978 network_delegate
.set_block_on(stage
);
2980 TestURLRequestContext
context(true);
2981 context
.set_network_delegate(&network_delegate
);
2985 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
2986 url
, DEFAULT_PRIORITY
, &d
, NULL
));
2989 base::RunLoop().Run();
2991 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
2992 // The proxy server is not set before cancellation.
2993 EXPECT_TRUE(r
->proxy_server().IsEmpty());
2994 EXPECT_EQ(ERR_BLOCKED_BY_CLIENT
, r
->status().error());
2995 EXPECT_EQ(1, network_delegate
.created_requests());
2996 EXPECT_EQ(0, network_delegate
.destroyed_requests());
2998 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3001 // The following 3 tests check that the network delegate can cancel a request
3002 // synchronously in various stages of the request.
3003 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelRequestSynchronously1
) {
3004 ASSERT_TRUE(test_server_
.Start());
3005 NetworkDelegateCancelRequest(BlockingNetworkDelegate::SYNCHRONOUS
,
3006 BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
,
3007 test_server_
.GetURL(std::string()));
3010 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelRequestSynchronously2
) {
3011 ASSERT_TRUE(test_server_
.Start());
3012 NetworkDelegateCancelRequest(BlockingNetworkDelegate::SYNCHRONOUS
,
3013 BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS
,
3014 test_server_
.GetURL(std::string()));
3017 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelRequestSynchronously3
) {
3018 ASSERT_TRUE(test_server_
.Start());
3019 NetworkDelegateCancelRequest(BlockingNetworkDelegate::SYNCHRONOUS
,
3020 BlockingNetworkDelegate::ON_HEADERS_RECEIVED
,
3021 test_server_
.GetURL(std::string()));
3024 // The following 3 tests check that the network delegate can cancel a request
3025 // asynchronously in various stages of the request.
3026 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelRequestAsynchronously1
) {
3027 ASSERT_TRUE(test_server_
.Start());
3028 NetworkDelegateCancelRequest(BlockingNetworkDelegate::AUTO_CALLBACK
,
3029 BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
,
3030 test_server_
.GetURL(std::string()));
3033 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelRequestAsynchronously2
) {
3034 ASSERT_TRUE(test_server_
.Start());
3035 NetworkDelegateCancelRequest(BlockingNetworkDelegate::AUTO_CALLBACK
,
3036 BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS
,
3037 test_server_
.GetURL(std::string()));
3040 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelRequestAsynchronously3
) {
3041 ASSERT_TRUE(test_server_
.Start());
3042 NetworkDelegateCancelRequest(BlockingNetworkDelegate::AUTO_CALLBACK
,
3043 BlockingNetworkDelegate::ON_HEADERS_RECEIVED
,
3044 test_server_
.GetURL(std::string()));
3047 // Tests that the network delegate can block and redirect a request to a new
3049 TEST_F(URLRequestTestHTTP
, NetworkDelegateRedirectRequest
) {
3050 ASSERT_TRUE(test_server_
.Start());
3053 BlockingNetworkDelegate
network_delegate(
3054 BlockingNetworkDelegate::AUTO_CALLBACK
);
3055 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
);
3056 GURL
redirect_url(test_server_
.GetURL("simple.html"));
3057 network_delegate
.set_redirect_url(redirect_url
);
3059 TestURLRequestContextWithProxy
context(
3060 test_server_
.host_port_pair().ToString(), &network_delegate
);
3063 GURL
original_url(test_server_
.GetURL("empty.html"));
3064 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3065 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
3067 // Quit after hitting the redirect, so can check the headers.
3068 d
.set_quit_on_redirect(true);
3070 base::RunLoop().Run();
3072 // Check headers from URLRequestJob.
3073 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3074 EXPECT_EQ(307, r
->GetResponseCode());
3075 EXPECT_EQ(307, r
->response_headers()->response_code());
3076 std::string location
;
3077 ASSERT_TRUE(r
->response_headers()->EnumerateHeader(NULL
, "Location",
3079 EXPECT_EQ(redirect_url
, GURL(location
));
3081 // Let the request finish.
3082 r
->FollowDeferredRedirect();
3083 base::RunLoop().Run();
3084 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3085 EXPECT_TRUE(r
->proxy_server().Equals(test_server_
.host_port_pair()));
3087 1, network_delegate
.observed_before_proxy_headers_sent_callbacks());
3089 network_delegate
.last_observed_proxy().Equals(
3090 test_server_
.host_port_pair()));
3092 EXPECT_EQ(0, r
->status().error());
3093 EXPECT_EQ(redirect_url
, r
->url());
3094 EXPECT_EQ(original_url
, r
->original_url());
3095 EXPECT_EQ(2U, r
->url_chain().size());
3096 EXPECT_EQ(1, network_delegate
.created_requests());
3097 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3099 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3102 // Tests that the network delegate can block and redirect a request to a new
3103 // URL by setting a redirect_url and returning in OnBeforeURLRequest directly.
3104 TEST_F(URLRequestTestHTTP
, NetworkDelegateRedirectRequestSynchronously
) {
3105 ASSERT_TRUE(test_server_
.Start());
3108 BlockingNetworkDelegate
network_delegate(
3109 BlockingNetworkDelegate::SYNCHRONOUS
);
3110 GURL
redirect_url(test_server_
.GetURL("simple.html"));
3111 network_delegate
.set_redirect_url(redirect_url
);
3113 TestURLRequestContextWithProxy
context(
3114 test_server_
.host_port_pair().ToString(), &network_delegate
);
3117 GURL
original_url(test_server_
.GetURL("empty.html"));
3118 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3119 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
3121 // Quit after hitting the redirect, so can check the headers.
3122 d
.set_quit_on_redirect(true);
3124 base::RunLoop().Run();
3126 // Check headers from URLRequestJob.
3127 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3128 EXPECT_EQ(307, r
->GetResponseCode());
3129 EXPECT_EQ(307, r
->response_headers()->response_code());
3130 std::string location
;
3131 ASSERT_TRUE(r
->response_headers()->EnumerateHeader(NULL
, "Location",
3133 EXPECT_EQ(redirect_url
, GURL(location
));
3135 // Let the request finish.
3136 r
->FollowDeferredRedirect();
3137 base::RunLoop().Run();
3139 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3140 EXPECT_TRUE(r
->proxy_server().Equals(test_server_
.host_port_pair()));
3142 1, network_delegate
.observed_before_proxy_headers_sent_callbacks());
3144 network_delegate
.last_observed_proxy().Equals(
3145 test_server_
.host_port_pair()));
3146 EXPECT_EQ(0, r
->status().error());
3147 EXPECT_EQ(redirect_url
, r
->url());
3148 EXPECT_EQ(original_url
, r
->original_url());
3149 EXPECT_EQ(2U, r
->url_chain().size());
3150 EXPECT_EQ(1, network_delegate
.created_requests());
3151 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3153 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3156 // Tests that redirects caused by the network delegate preserve POST data.
3157 TEST_F(URLRequestTestHTTP
, NetworkDelegateRedirectRequestPost
) {
3158 ASSERT_TRUE(test_server_
.Start());
3160 const char kData
[] = "hello world";
3163 BlockingNetworkDelegate
network_delegate(
3164 BlockingNetworkDelegate::AUTO_CALLBACK
);
3165 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
);
3166 GURL
redirect_url(test_server_
.GetURL("echo"));
3167 network_delegate
.set_redirect_url(redirect_url
);
3169 TestURLRequestContext
context(true);
3170 context
.set_network_delegate(&network_delegate
);
3174 GURL
original_url(test_server_
.GetURL("empty.html"));
3175 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3176 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
3177 r
->set_method("POST");
3178 r
->set_upload(CreateSimpleUploadData(kData
));
3179 HttpRequestHeaders headers
;
3180 headers
.SetHeader(HttpRequestHeaders::kContentLength
,
3181 base::UintToString(arraysize(kData
) - 1));
3182 r
->SetExtraRequestHeaders(headers
);
3184 // Quit after hitting the redirect, so can check the headers.
3185 d
.set_quit_on_redirect(true);
3187 base::RunLoop().Run();
3189 // Check headers from URLRequestJob.
3190 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3191 EXPECT_EQ(307, r
->GetResponseCode());
3192 EXPECT_EQ(307, r
->response_headers()->response_code());
3193 std::string location
;
3194 ASSERT_TRUE(r
->response_headers()->EnumerateHeader(NULL
, "Location",
3196 EXPECT_EQ(redirect_url
, GURL(location
));
3198 // Let the request finish.
3199 r
->FollowDeferredRedirect();
3200 base::RunLoop().Run();
3202 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3203 EXPECT_EQ(0, r
->status().error());
3204 EXPECT_EQ(redirect_url
, r
->url());
3205 EXPECT_EQ(original_url
, r
->original_url());
3206 EXPECT_EQ(2U, r
->url_chain().size());
3207 EXPECT_EQ(1, network_delegate
.created_requests());
3208 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3209 EXPECT_EQ("POST", r
->method());
3210 EXPECT_EQ(kData
, d
.data_received());
3212 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3215 // Tests that the network delegate can block and redirect a request to a new
3216 // URL during OnHeadersReceived.
3217 TEST_F(URLRequestTestHTTP
, NetworkDelegateRedirectRequestOnHeadersReceived
) {
3218 ASSERT_TRUE(test_server_
.Start());
3221 BlockingNetworkDelegate
network_delegate(
3222 BlockingNetworkDelegate::AUTO_CALLBACK
);
3223 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_HEADERS_RECEIVED
);
3224 GURL
redirect_url(test_server_
.GetURL("simple.html"));
3225 network_delegate
.set_redirect_on_headers_received_url(redirect_url
);
3227 TestURLRequestContextWithProxy
context(
3228 test_server_
.host_port_pair().ToString(), &network_delegate
);
3231 GURL
original_url(test_server_
.GetURL("empty.html"));
3232 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3233 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
3236 base::RunLoop().Run();
3238 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3239 EXPECT_TRUE(r
->proxy_server().Equals(test_server_
.host_port_pair()));
3241 2, network_delegate
.observed_before_proxy_headers_sent_callbacks());
3243 network_delegate
.last_observed_proxy().Equals(
3244 test_server_
.host_port_pair()));
3246 EXPECT_EQ(OK
, r
->status().error());
3247 EXPECT_EQ(redirect_url
, r
->url());
3248 EXPECT_EQ(original_url
, r
->original_url());
3249 EXPECT_EQ(2U, r
->url_chain().size());
3250 EXPECT_EQ(2, network_delegate
.created_requests());
3251 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3253 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3256 // Tests that the network delegate can synchronously complete OnAuthRequired
3257 // by taking no action. This indicates that the NetworkDelegate does not want to
3258 // handle the challenge, and is passing the buck along to the
3259 // URLRequest::Delegate.
3260 TEST_F(URLRequestTestHTTP
, NetworkDelegateOnAuthRequiredSyncNoAction
) {
3261 ASSERT_TRUE(test_server_
.Start());
3264 BlockingNetworkDelegate
network_delegate(
3265 BlockingNetworkDelegate::SYNCHRONOUS
);
3267 TestURLRequestContext
context(true);
3268 context
.set_network_delegate(&network_delegate
);
3271 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
3274 GURL
url(test_server_
.GetURL("auth-basic"));
3275 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3276 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3279 base::RunLoop().Run();
3281 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3282 EXPECT_EQ(0, r
->status().error());
3283 EXPECT_EQ(200, r
->GetResponseCode());
3284 EXPECT_TRUE(d
.auth_required_called());
3285 EXPECT_EQ(1, network_delegate
.created_requests());
3286 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3288 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3291 TEST_F(URLRequestTestHTTP
,
3292 NetworkDelegateOnAuthRequiredSyncNoAction_GetFullRequestHeaders
) {
3293 ASSERT_TRUE(test_server_
.Start());
3296 BlockingNetworkDelegate
network_delegate(
3297 BlockingNetworkDelegate::SYNCHRONOUS
);
3299 TestURLRequestContext
context(true);
3300 context
.set_network_delegate(&network_delegate
);
3303 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
3306 GURL
url(test_server_
.GetURL("auth-basic"));
3307 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3308 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3312 HttpRequestHeaders headers
;
3313 EXPECT_TRUE(r
->GetFullRequestHeaders(&headers
));
3314 EXPECT_FALSE(headers
.HasHeader("Authorization"));
3317 base::RunLoop().Run();
3319 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3320 EXPECT_EQ(0, r
->status().error());
3321 EXPECT_EQ(200, r
->GetResponseCode());
3322 EXPECT_TRUE(d
.auth_required_called());
3323 EXPECT_EQ(1, network_delegate
.created_requests());
3324 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3326 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3329 // Tests that the network delegate can synchronously complete OnAuthRequired
3330 // by setting credentials.
3331 TEST_F(URLRequestTestHTTP
, NetworkDelegateOnAuthRequiredSyncSetAuth
) {
3332 ASSERT_TRUE(test_server_
.Start());
3335 BlockingNetworkDelegate
network_delegate(
3336 BlockingNetworkDelegate::SYNCHRONOUS
);
3337 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_AUTH_REQUIRED
);
3338 network_delegate
.set_auth_retval(
3339 NetworkDelegate::AUTH_REQUIRED_RESPONSE_SET_AUTH
);
3341 network_delegate
.set_auth_credentials(AuthCredentials(kUser
, kSecret
));
3343 TestURLRequestContext
context(true);
3344 context
.set_network_delegate(&network_delegate
);
3348 GURL
url(test_server_
.GetURL("auth-basic"));
3349 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3350 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3352 base::RunLoop().Run();
3354 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3355 EXPECT_EQ(0, r
->status().error());
3356 EXPECT_EQ(200, r
->GetResponseCode());
3357 EXPECT_FALSE(d
.auth_required_called());
3358 EXPECT_EQ(1, network_delegate
.created_requests());
3359 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3361 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3364 // Same as above, but also tests that GetFullRequestHeaders returns the proper
3365 // headers (for the first or second request) when called at the proper times.
3366 TEST_F(URLRequestTestHTTP
,
3367 NetworkDelegateOnAuthRequiredSyncSetAuth_GetFullRequestHeaders
) {
3368 ASSERT_TRUE(test_server_
.Start());
3371 BlockingNetworkDelegate
network_delegate(
3372 BlockingNetworkDelegate::SYNCHRONOUS
);
3373 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_AUTH_REQUIRED
);
3374 network_delegate
.set_auth_retval(
3375 NetworkDelegate::AUTH_REQUIRED_RESPONSE_SET_AUTH
);
3377 network_delegate
.set_auth_credentials(AuthCredentials(kUser
, kSecret
));
3379 TestURLRequestContext
context(true);
3380 context
.set_network_delegate(&network_delegate
);
3384 GURL
url(test_server_
.GetURL("auth-basic"));
3385 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3386 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3388 base::RunLoop().Run();
3390 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3391 EXPECT_EQ(0, r
->status().error());
3392 EXPECT_EQ(200, r
->GetResponseCode());
3393 EXPECT_FALSE(d
.auth_required_called());
3394 EXPECT_EQ(1, network_delegate
.created_requests());
3395 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3398 HttpRequestHeaders headers
;
3399 EXPECT_TRUE(r
->GetFullRequestHeaders(&headers
));
3400 EXPECT_TRUE(headers
.HasHeader("Authorization"));
3403 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3406 // Tests that the network delegate can synchronously complete OnAuthRequired
3407 // by cancelling authentication.
3408 TEST_F(URLRequestTestHTTP
, NetworkDelegateOnAuthRequiredSyncCancel
) {
3409 ASSERT_TRUE(test_server_
.Start());
3412 BlockingNetworkDelegate
network_delegate(
3413 BlockingNetworkDelegate::SYNCHRONOUS
);
3414 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_AUTH_REQUIRED
);
3415 network_delegate
.set_auth_retval(
3416 NetworkDelegate::AUTH_REQUIRED_RESPONSE_CANCEL_AUTH
);
3418 TestURLRequestContext
context(true);
3419 context
.set_network_delegate(&network_delegate
);
3423 GURL
url(test_server_
.GetURL("auth-basic"));
3424 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3425 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3427 base::RunLoop().Run();
3429 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3430 EXPECT_EQ(OK
, r
->status().error());
3431 EXPECT_EQ(401, r
->GetResponseCode());
3432 EXPECT_FALSE(d
.auth_required_called());
3433 EXPECT_EQ(1, network_delegate
.created_requests());
3434 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3436 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3439 // Tests that the network delegate can asynchronously complete OnAuthRequired
3440 // by taking no action. This indicates that the NetworkDelegate does not want
3441 // to handle the challenge, and is passing the buck along to the
3442 // URLRequest::Delegate.
3443 TEST_F(URLRequestTestHTTP
, NetworkDelegateOnAuthRequiredAsyncNoAction
) {
3444 ASSERT_TRUE(test_server_
.Start());
3447 BlockingNetworkDelegate
network_delegate(
3448 BlockingNetworkDelegate::AUTO_CALLBACK
);
3449 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_AUTH_REQUIRED
);
3451 TestURLRequestContext
context(true);
3452 context
.set_network_delegate(&network_delegate
);
3455 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
3458 GURL
url(test_server_
.GetURL("auth-basic"));
3459 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3460 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3462 base::RunLoop().Run();
3464 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3465 EXPECT_EQ(0, r
->status().error());
3466 EXPECT_EQ(200, r
->GetResponseCode());
3467 EXPECT_TRUE(d
.auth_required_called());
3468 EXPECT_EQ(1, network_delegate
.created_requests());
3469 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3471 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3474 // Tests that the network delegate can asynchronously complete OnAuthRequired
3475 // by setting credentials.
3476 TEST_F(URLRequestTestHTTP
, NetworkDelegateOnAuthRequiredAsyncSetAuth
) {
3477 ASSERT_TRUE(test_server_
.Start());
3480 BlockingNetworkDelegate
network_delegate(
3481 BlockingNetworkDelegate::AUTO_CALLBACK
);
3482 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_AUTH_REQUIRED
);
3483 network_delegate
.set_auth_retval(
3484 NetworkDelegate::AUTH_REQUIRED_RESPONSE_SET_AUTH
);
3486 AuthCredentials
auth_credentials(kUser
, kSecret
);
3487 network_delegate
.set_auth_credentials(auth_credentials
);
3489 TestURLRequestContext
context(true);
3490 context
.set_network_delegate(&network_delegate
);
3494 GURL
url(test_server_
.GetURL("auth-basic"));
3495 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3496 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3498 base::RunLoop().Run();
3500 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3501 EXPECT_EQ(0, r
->status().error());
3503 EXPECT_EQ(200, r
->GetResponseCode());
3504 EXPECT_FALSE(d
.auth_required_called());
3505 EXPECT_EQ(1, network_delegate
.created_requests());
3506 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3508 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3511 // Tests that the network delegate can asynchronously complete OnAuthRequired
3512 // by cancelling authentication.
3513 TEST_F(URLRequestTestHTTP
, NetworkDelegateOnAuthRequiredAsyncCancel
) {
3514 ASSERT_TRUE(test_server_
.Start());
3517 BlockingNetworkDelegate
network_delegate(
3518 BlockingNetworkDelegate::AUTO_CALLBACK
);
3519 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_AUTH_REQUIRED
);
3520 network_delegate
.set_auth_retval(
3521 NetworkDelegate::AUTH_REQUIRED_RESPONSE_CANCEL_AUTH
);
3523 TestURLRequestContext
context(true);
3524 context
.set_network_delegate(&network_delegate
);
3528 GURL
url(test_server_
.GetURL("auth-basic"));
3529 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3530 url
, DEFAULT_PRIORITY
, &d
, NULL
));
3532 base::RunLoop().Run();
3534 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
3535 EXPECT_EQ(OK
, r
->status().error());
3536 EXPECT_EQ(401, r
->GetResponseCode());
3537 EXPECT_FALSE(d
.auth_required_called());
3538 EXPECT_EQ(1, network_delegate
.created_requests());
3539 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3541 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3544 // Tests that we can handle when a network request was canceled while we were
3545 // waiting for the network delegate.
3546 // Part 1: Request is cancelled while waiting for OnBeforeURLRequest callback.
3547 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelWhileWaiting1
) {
3548 ASSERT_TRUE(test_server_
.Start());
3551 BlockingNetworkDelegate
network_delegate(
3552 BlockingNetworkDelegate::USER_CALLBACK
);
3553 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
);
3555 TestURLRequestContext
context(true);
3556 context
.set_network_delegate(&network_delegate
);
3560 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3561 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
3564 base::RunLoop().Run();
3565 EXPECT_EQ(BlockingNetworkDelegate::ON_BEFORE_URL_REQUEST
,
3566 network_delegate
.stage_blocked_for_callback());
3567 EXPECT_EQ(0, network_delegate
.completed_requests());
3568 // Cancel before callback.
3570 // Ensure that network delegate is notified.
3571 EXPECT_EQ(1, network_delegate
.completed_requests());
3572 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
3573 EXPECT_EQ(ERR_ABORTED
, r
->status().error());
3574 EXPECT_EQ(1, network_delegate
.created_requests());
3575 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3577 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3580 // Tests that we can handle when a network request was canceled while we were
3581 // waiting for the network delegate.
3582 // Part 2: Request is cancelled while waiting for OnBeforeSendHeaders callback.
3583 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelWhileWaiting2
) {
3584 ASSERT_TRUE(test_server_
.Start());
3587 BlockingNetworkDelegate
network_delegate(
3588 BlockingNetworkDelegate::USER_CALLBACK
);
3589 network_delegate
.set_block_on(
3590 BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS
);
3592 TestURLRequestContext
context(true);
3593 context
.set_network_delegate(&network_delegate
);
3597 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3598 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
3601 base::RunLoop().Run();
3602 EXPECT_EQ(BlockingNetworkDelegate::ON_BEFORE_SEND_HEADERS
,
3603 network_delegate
.stage_blocked_for_callback());
3604 EXPECT_EQ(0, network_delegate
.completed_requests());
3605 // Cancel before callback.
3607 // Ensure that network delegate is notified.
3608 EXPECT_EQ(1, network_delegate
.completed_requests());
3609 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
3610 EXPECT_EQ(ERR_ABORTED
, r
->status().error());
3611 EXPECT_EQ(1, network_delegate
.created_requests());
3612 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3614 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3617 // Tests that we can handle when a network request was canceled while we were
3618 // waiting for the network delegate.
3619 // Part 3: Request is cancelled while waiting for OnHeadersReceived callback.
3620 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelWhileWaiting3
) {
3621 ASSERT_TRUE(test_server_
.Start());
3624 BlockingNetworkDelegate
network_delegate(
3625 BlockingNetworkDelegate::USER_CALLBACK
);
3626 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_HEADERS_RECEIVED
);
3628 TestURLRequestContext
context(true);
3629 context
.set_network_delegate(&network_delegate
);
3633 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3634 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
3637 base::RunLoop().Run();
3638 EXPECT_EQ(BlockingNetworkDelegate::ON_HEADERS_RECEIVED
,
3639 network_delegate
.stage_blocked_for_callback());
3640 EXPECT_EQ(0, network_delegate
.completed_requests());
3641 // Cancel before callback.
3643 // Ensure that network delegate is notified.
3644 EXPECT_EQ(1, network_delegate
.completed_requests());
3645 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
3646 EXPECT_EQ(ERR_ABORTED
, r
->status().error());
3647 EXPECT_EQ(1, network_delegate
.created_requests());
3648 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3650 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3653 // Tests that we can handle when a network request was canceled while we were
3654 // waiting for the network delegate.
3655 // Part 4: Request is cancelled while waiting for OnAuthRequired callback.
3656 TEST_F(URLRequestTestHTTP
, NetworkDelegateCancelWhileWaiting4
) {
3657 ASSERT_TRUE(test_server_
.Start());
3660 BlockingNetworkDelegate
network_delegate(
3661 BlockingNetworkDelegate::USER_CALLBACK
);
3662 network_delegate
.set_block_on(BlockingNetworkDelegate::ON_AUTH_REQUIRED
);
3664 TestURLRequestContext
context(true);
3665 context
.set_network_delegate(&network_delegate
);
3669 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3670 test_server_
.GetURL("auth-basic"), DEFAULT_PRIORITY
, &d
, NULL
));
3673 base::RunLoop().Run();
3674 EXPECT_EQ(BlockingNetworkDelegate::ON_AUTH_REQUIRED
,
3675 network_delegate
.stage_blocked_for_callback());
3676 EXPECT_EQ(0, network_delegate
.completed_requests());
3677 // Cancel before callback.
3679 // Ensure that network delegate is notified.
3680 EXPECT_EQ(1, network_delegate
.completed_requests());
3681 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
3682 EXPECT_EQ(ERR_ABORTED
, r
->status().error());
3683 EXPECT_EQ(1, network_delegate
.created_requests());
3684 EXPECT_EQ(0, network_delegate
.destroyed_requests());
3686 EXPECT_EQ(1, network_delegate
.destroyed_requests());
3689 // In this unit test, we're using the HTTPTestServer as a proxy server and
3690 // issuing a CONNECT request with the magic host name "www.server-auth.com".
3691 // The HTTPTestServer will return a 401 response, which we should balk at.
3692 TEST_F(URLRequestTestHTTP
, UnexpectedServerAuthTest
) {
3693 ASSERT_TRUE(test_server_
.Start());
3695 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
3696 TestURLRequestContextWithProxy
context(
3697 test_server_
.host_port_pair().ToString(), &network_delegate
);
3701 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3702 GURL("https://www.server-auth.com/"), DEFAULT_PRIORITY
, &d
, NULL
));
3705 EXPECT_TRUE(r
->is_pending());
3707 base::RunLoop().Run();
3709 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
3710 // The proxy server is not set before failure.
3711 EXPECT_TRUE(r
->proxy_server().IsEmpty());
3712 EXPECT_EQ(ERR_TUNNEL_CONNECTION_FAILED
, r
->status().error());
3716 TEST_F(URLRequestTestHTTP
, GetTest_NoCache
) {
3717 ASSERT_TRUE(test_server_
.Start());
3721 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
3722 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
3725 EXPECT_TRUE(r
->is_pending());
3727 base::RunLoop().Run();
3729 EXPECT_EQ(1, d
.response_started_count());
3730 EXPECT_FALSE(d
.received_data_before_response());
3731 EXPECT_NE(0, d
.bytes_received());
3732 EXPECT_EQ(test_server_
.host_port_pair().host(),
3733 r
->GetSocketAddress().host());
3734 EXPECT_EQ(test_server_
.host_port_pair().port(),
3735 r
->GetSocketAddress().port());
3737 // TODO(eroman): Add back the NetLog tests...
3741 // This test has the server send a large number of cookies to the client.
3742 // To ensure that no number of cookies causes a crash, a galloping binary
3743 // search is used to estimate that maximum number of cookies that are accepted
3744 // by the browser. Beyond the maximum number, the request will fail with
3745 // ERR_RESPONSE_HEADERS_TOO_BIG.
3747 // http://crbug.com/177916
3748 #define MAYBE_GetTest_ManyCookies DISABLED_GetTest_ManyCookies
3750 #define MAYBE_GetTest_ManyCookies GetTest_ManyCookies
3751 #endif // defined(OS_WIN)
3752 TEST_F(URLRequestTestHTTP
, MAYBE_GetTest_ManyCookies
) {
3753 ASSERT_TRUE(test_server_
.Start());
3755 int lower_bound
= 0;
3756 int upper_bound
= 1;
3758 // Double the number of cookies until the response header limits are
3760 while (DoManyCookiesRequest(upper_bound
)) {
3761 lower_bound
= upper_bound
;
3763 ASSERT_LT(upper_bound
, 1000000);
3766 int tolerance
= static_cast<int>(upper_bound
* 0.005);
3770 // Perform a binary search to find the highest possible number of cookies,
3771 // within the desired tolerance.
3772 while (upper_bound
- lower_bound
>= tolerance
) {
3773 int num_cookies
= (lower_bound
+ upper_bound
) / 2;
3775 if (DoManyCookiesRequest(num_cookies
))
3776 lower_bound
= num_cookies
;
3778 upper_bound
= num_cookies
;
3780 // Success: the test did not crash.
3783 TEST_F(URLRequestTestHTTP
, GetTest
) {
3784 ASSERT_TRUE(test_server_
.Start());
3788 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
3789 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
3792 EXPECT_TRUE(r
->is_pending());
3794 base::RunLoop().Run();
3796 EXPECT_EQ(1, d
.response_started_count());
3797 EXPECT_FALSE(d
.received_data_before_response());
3798 EXPECT_NE(0, d
.bytes_received());
3799 EXPECT_EQ(test_server_
.host_port_pair().host(),
3800 r
->GetSocketAddress().host());
3801 EXPECT_EQ(test_server_
.host_port_pair().port(),
3802 r
->GetSocketAddress().port());
3806 TEST_F(URLRequestTestHTTP
, GetTest_GetFullRequestHeaders
) {
3807 ASSERT_TRUE(test_server_
.Start());
3811 GURL
test_url(test_server_
.GetURL(std::string()));
3812 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
3813 test_url
, DEFAULT_PRIORITY
, &d
, NULL
));
3815 HttpRequestHeaders headers
;
3816 EXPECT_FALSE(r
->GetFullRequestHeaders(&headers
));
3819 EXPECT_TRUE(r
->is_pending());
3821 base::RunLoop().Run();
3823 EXPECT_EQ(1, d
.response_started_count());
3824 EXPECT_FALSE(d
.received_data_before_response());
3825 EXPECT_NE(0, d
.bytes_received());
3826 EXPECT_EQ(test_server_
.host_port_pair().host(),
3827 r
->GetSocketAddress().host());
3828 EXPECT_EQ(test_server_
.host_port_pair().port(),
3829 r
->GetSocketAddress().port());
3831 EXPECT_TRUE(d
.have_full_request_headers());
3832 CheckFullRequestHeaders(d
.full_request_headers(), test_url
);
3836 TEST_F(URLRequestTestHTTP
, GetTestLoadTiming
) {
3837 ASSERT_TRUE(test_server_
.Start());
3841 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
3842 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
3845 EXPECT_TRUE(r
->is_pending());
3847 base::RunLoop().Run();
3849 LoadTimingInfo load_timing_info
;
3850 r
->GetLoadTimingInfo(&load_timing_info
);
3851 TestLoadTimingNotReused(load_timing_info
, CONNECT_TIMING_HAS_DNS_TIMES
);
3853 EXPECT_EQ(1, d
.response_started_count());
3854 EXPECT_FALSE(d
.received_data_before_response());
3855 EXPECT_NE(0, d
.bytes_received());
3856 EXPECT_EQ(test_server_
.host_port_pair().host(),
3857 r
->GetSocketAddress().host());
3858 EXPECT_EQ(test_server_
.host_port_pair().port(),
3859 r
->GetSocketAddress().port());
3863 TEST_F(URLRequestTestHTTP
, GetZippedTest
) {
3864 ASSERT_TRUE(test_server_
.Start());
3866 // Parameter that specifies the Content-Length field in the response:
3867 // C - Compressed length.
3868 // U - Uncompressed length.
3869 // L - Large length (larger than both C & U).
3870 // M - Medium length (between C & U).
3871 // S - Small length (smaller than both C & U).
3872 const char test_parameters
[] = "CULMS";
3873 const int num_tests
= arraysize(test_parameters
)- 1; // Skip NULL.
3874 // C & U should be OK.
3875 // L & M are larger than the data sent, and show an error.
3876 // S has too little data, but we seem to accept it.
3877 const bool test_expect_success
[num_tests
] =
3878 { true, true, false, false, true };
3880 for (int i
= 0; i
< num_tests
; i
++) {
3883 std::string test_file
=
3884 base::StringPrintf("compressedfiles/BullRunSpeech.txt?%c",
3885 test_parameters
[i
]);
3887 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
3888 TestURLRequestContext
context(true);
3889 context
.set_network_delegate(&network_delegate
);
3892 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
3893 test_server_
.GetURL(test_file
), DEFAULT_PRIORITY
, &d
, NULL
));
3895 EXPECT_TRUE(r
->is_pending());
3897 base::RunLoop().Run();
3899 EXPECT_EQ(1, d
.response_started_count());
3900 EXPECT_FALSE(d
.received_data_before_response());
3901 VLOG(1) << " Received " << d
.bytes_received() << " bytes"
3902 << " status = " << r
->status().status()
3903 << " error = " << r
->status().error();
3904 if (test_expect_success
[i
]) {
3905 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status())
3906 << " Parameter = \"" << test_file
<< "\"";
3908 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
3909 EXPECT_EQ(ERR_CONTENT_LENGTH_MISMATCH
, r
->status().error())
3910 << " Parameter = \"" << test_file
<< "\"";
3916 TEST_F(URLRequestTestHTTP
, RedirectLoadTiming
) {
3917 ASSERT_TRUE(test_server_
.Start());
3919 GURL destination_url
= test_server_
.GetURL(std::string());
3921 test_server_
.GetURL("server-redirect?" + destination_url
.spec());
3923 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
3924 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
3926 base::RunLoop().Run();
3928 EXPECT_EQ(1, d
.response_started_count());
3929 EXPECT_EQ(1, d
.received_redirect_count());
3930 EXPECT_EQ(destination_url
, req
->url());
3931 EXPECT_EQ(original_url
, req
->original_url());
3932 ASSERT_EQ(2U, req
->url_chain().size());
3933 EXPECT_EQ(original_url
, req
->url_chain()[0]);
3934 EXPECT_EQ(destination_url
, req
->url_chain()[1]);
3936 LoadTimingInfo load_timing_info_before_redirect
;
3937 EXPECT_TRUE(default_network_delegate_
.GetLoadTimingInfoBeforeRedirect(
3938 &load_timing_info_before_redirect
));
3939 TestLoadTimingNotReused(load_timing_info_before_redirect
,
3940 CONNECT_TIMING_HAS_DNS_TIMES
);
3942 LoadTimingInfo load_timing_info
;
3943 req
->GetLoadTimingInfo(&load_timing_info
);
3944 TestLoadTimingNotReused(load_timing_info
, CONNECT_TIMING_HAS_DNS_TIMES
);
3946 // Check that a new socket was used on redirect, since the server does not
3947 // supposed keep-alive sockets, and that the times before the redirect are
3948 // before the ones recorded for the second request.
3949 EXPECT_NE(load_timing_info_before_redirect
.socket_log_id
,
3950 load_timing_info
.socket_log_id
);
3951 EXPECT_LE(load_timing_info_before_redirect
.receive_headers_end
,
3952 load_timing_info
.connect_timing
.connect_start
);
3955 TEST_F(URLRequestTestHTTP
, MultipleRedirectTest
) {
3956 ASSERT_TRUE(test_server_
.Start());
3958 GURL destination_url
= test_server_
.GetURL(std::string());
3959 GURL middle_redirect_url
=
3960 test_server_
.GetURL("server-redirect?" + destination_url
.spec());
3961 GURL original_url
= test_server_
.GetURL(
3962 "server-redirect?" + middle_redirect_url
.spec());
3964 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
3965 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
3967 base::RunLoop().Run();
3969 EXPECT_EQ(1, d
.response_started_count());
3970 EXPECT_EQ(2, d
.received_redirect_count());
3971 EXPECT_EQ(destination_url
, req
->url());
3972 EXPECT_EQ(original_url
, req
->original_url());
3973 ASSERT_EQ(3U, req
->url_chain().size());
3974 EXPECT_EQ(original_url
, req
->url_chain()[0]);
3975 EXPECT_EQ(middle_redirect_url
, req
->url_chain()[1]);
3976 EXPECT_EQ(destination_url
, req
->url_chain()[2]);
3979 // First and second pieces of information logged by delegates to URLRequests.
3980 const char kFirstDelegateInfo
[] = "Wonderful delegate";
3981 const char kSecondDelegateInfo
[] = "Exciting delegate";
3983 // Logs delegate information to a URLRequest. The first string is logged
3984 // synchronously on Start(), using DELEGATE_INFO_DEBUG_ONLY. The second is
3985 // logged asynchronously, using DELEGATE_INFO_DISPLAY_TO_USER. Then
3986 // another asynchronous call is used to clear the delegate information
3987 // before calling a callback. The object then deletes itself.
3988 class AsyncDelegateLogger
: public base::RefCounted
<AsyncDelegateLogger
> {
3990 typedef base::Callback
<void()> Callback
;
3992 // Each time delegate information is added to the URLRequest, the resulting
3993 // load state is checked. The expected load state after each request is
3994 // passed in as an argument.
3995 static void Run(URLRequest
* url_request
,
3996 LoadState expected_first_load_state
,
3997 LoadState expected_second_load_state
,
3998 LoadState expected_third_load_state
,
3999 const Callback
& callback
) {
4000 AsyncDelegateLogger
* logger
= new AsyncDelegateLogger(
4002 expected_first_load_state
,
4003 expected_second_load_state
,
4004 expected_third_load_state
,
4009 // Checks that the log entries, starting with log_position, contain the
4010 // DELEGATE_INFO NetLog events that an AsyncDelegateLogger should have
4011 // recorded. Returns the index of entry after the expected number of
4012 // events this logged, or entries.size() if there aren't enough entries.
4013 static size_t CheckDelegateInfo(
4014 const CapturingNetLog::CapturedEntryList
& entries
, size_t log_position
) {
4015 // There should be 4 DELEGATE_INFO events: Two begins and two ends.
4016 if (log_position
+ 3 >= entries
.size()) {
4017 ADD_FAILURE() << "Not enough log entries";
4018 return entries
.size();
4020 std::string delegate_info
;
4021 EXPECT_EQ(NetLog::TYPE_DELEGATE_INFO
, entries
[log_position
].type
);
4022 EXPECT_EQ(NetLog::PHASE_BEGIN
, entries
[log_position
].phase
);
4023 EXPECT_TRUE(entries
[log_position
].GetStringValue("delegate_info",
4025 EXPECT_EQ(kFirstDelegateInfo
, delegate_info
);
4028 EXPECT_EQ(NetLog::TYPE_DELEGATE_INFO
, entries
[log_position
].type
);
4029 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4032 EXPECT_EQ(NetLog::TYPE_DELEGATE_INFO
, entries
[log_position
].type
);
4033 EXPECT_EQ(NetLog::PHASE_BEGIN
, entries
[log_position
].phase
);
4034 EXPECT_TRUE(entries
[log_position
].GetStringValue("delegate_info",
4036 EXPECT_EQ(kSecondDelegateInfo
, delegate_info
);
4039 EXPECT_EQ(NetLog::TYPE_DELEGATE_INFO
, entries
[log_position
].type
);
4040 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4042 return log_position
+ 1;
4045 // Find delegate request begin and end messages for OnBeforeNetworkStart.
4046 // Returns the position of the end message.
4047 static size_t ExpectBeforeNetworkEvents(
4048 const CapturingNetLog::CapturedEntryList
& entries
,
4049 size_t log_position
) {
4051 ExpectLogContainsSomewhereAfter(entries
,
4053 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4054 NetLog::PHASE_BEGIN
);
4055 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
,
4056 entries
[log_position
+ 1].type
);
4057 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
+ 1].phase
);
4058 return log_position
+ 1;
4062 friend class base::RefCounted
<AsyncDelegateLogger
>;
4064 AsyncDelegateLogger(URLRequest
* url_request
,
4065 LoadState expected_first_load_state
,
4066 LoadState expected_second_load_state
,
4067 LoadState expected_third_load_state
,
4068 const Callback
& callback
)
4069 : url_request_(url_request
),
4070 expected_first_load_state_(expected_first_load_state
),
4071 expected_second_load_state_(expected_second_load_state
),
4072 expected_third_load_state_(expected_third_load_state
),
4073 callback_(callback
) {
4076 ~AsyncDelegateLogger() {}
4079 url_request_
->LogBlockedBy(kFirstDelegateInfo
);
4080 LoadStateWithParam load_state
= url_request_
->GetLoadState();
4081 EXPECT_EQ(expected_first_load_state_
, load_state
.state
);
4082 EXPECT_NE(ASCIIToUTF16(kFirstDelegateInfo
), load_state
.param
);
4083 base::MessageLoop::current()->PostTask(
4085 base::Bind(&AsyncDelegateLogger::LogSecondDelegate
, this));
4088 void LogSecondDelegate() {
4089 url_request_
->LogAndReportBlockedBy(kSecondDelegateInfo
);
4090 LoadStateWithParam load_state
= url_request_
->GetLoadState();
4091 EXPECT_EQ(expected_second_load_state_
, load_state
.state
);
4092 if (expected_second_load_state_
== LOAD_STATE_WAITING_FOR_DELEGATE
) {
4093 EXPECT_EQ(ASCIIToUTF16(kSecondDelegateInfo
), load_state
.param
);
4095 EXPECT_NE(ASCIIToUTF16(kSecondDelegateInfo
), load_state
.param
);
4097 base::MessageLoop::current()->PostTask(
4099 base::Bind(&AsyncDelegateLogger::LogComplete
, this));
4102 void LogComplete() {
4103 url_request_
->LogUnblocked();
4104 LoadStateWithParam load_state
= url_request_
->GetLoadState();
4105 EXPECT_EQ(expected_third_load_state_
, load_state
.state
);
4106 if (expected_second_load_state_
== LOAD_STATE_WAITING_FOR_DELEGATE
)
4107 EXPECT_EQ(base::string16(), load_state
.param
);
4111 URLRequest
* url_request_
;
4112 const int expected_first_load_state_
;
4113 const int expected_second_load_state_
;
4114 const int expected_third_load_state_
;
4115 const Callback callback_
;
4117 DISALLOW_COPY_AND_ASSIGN(AsyncDelegateLogger
);
4120 // NetworkDelegate that logs delegate information before a request is started,
4121 // before headers are sent, when headers are read, and when auth information
4122 // is requested. Uses AsyncDelegateLogger.
4123 class AsyncLoggingNetworkDelegate
: public TestNetworkDelegate
{
4125 AsyncLoggingNetworkDelegate() {}
4126 ~AsyncLoggingNetworkDelegate() override
{}
4128 // NetworkDelegate implementation.
4129 int OnBeforeURLRequest(URLRequest
* request
,
4130 const CompletionCallback
& callback
,
4131 GURL
* new_url
) override
{
4132 TestNetworkDelegate::OnBeforeURLRequest(request
, callback
, new_url
);
4133 return RunCallbackAsynchronously(request
, callback
);
4136 int OnBeforeSendHeaders(URLRequest
* request
,
4137 const CompletionCallback
& callback
,
4138 HttpRequestHeaders
* headers
) override
{
4139 TestNetworkDelegate::OnBeforeSendHeaders(request
, callback
, headers
);
4140 return RunCallbackAsynchronously(request
, callback
);
4143 int OnHeadersReceived(
4144 URLRequest
* request
,
4145 const CompletionCallback
& callback
,
4146 const HttpResponseHeaders
* original_response_headers
,
4147 scoped_refptr
<HttpResponseHeaders
>* override_response_headers
,
4148 GURL
* allowed_unsafe_redirect_url
) override
{
4149 TestNetworkDelegate::OnHeadersReceived(request
,
4151 original_response_headers
,
4152 override_response_headers
,
4153 allowed_unsafe_redirect_url
);
4154 return RunCallbackAsynchronously(request
, callback
);
4157 NetworkDelegate::AuthRequiredResponse
OnAuthRequired(
4158 URLRequest
* request
,
4159 const AuthChallengeInfo
& auth_info
,
4160 const AuthCallback
& callback
,
4161 AuthCredentials
* credentials
) override
{
4162 AsyncDelegateLogger::Run(
4164 LOAD_STATE_WAITING_FOR_DELEGATE
,
4165 LOAD_STATE_WAITING_FOR_DELEGATE
,
4166 LOAD_STATE_WAITING_FOR_DELEGATE
,
4167 base::Bind(&AsyncLoggingNetworkDelegate::SetAuthAndResume
,
4168 callback
, credentials
));
4169 return AUTH_REQUIRED_RESPONSE_IO_PENDING
;
4173 static int RunCallbackAsynchronously(
4174 URLRequest
* request
,
4175 const CompletionCallback
& callback
) {
4176 AsyncDelegateLogger::Run(
4178 LOAD_STATE_WAITING_FOR_DELEGATE
,
4179 LOAD_STATE_WAITING_FOR_DELEGATE
,
4180 LOAD_STATE_WAITING_FOR_DELEGATE
,
4181 base::Bind(callback
, OK
));
4182 return ERR_IO_PENDING
;
4185 static void SetAuthAndResume(const AuthCallback
& callback
,
4186 AuthCredentials
* credentials
) {
4187 *credentials
= AuthCredentials(kUser
, kSecret
);
4188 callback
.Run(NetworkDelegate::AUTH_REQUIRED_RESPONSE_SET_AUTH
);
4191 DISALLOW_COPY_AND_ASSIGN(AsyncLoggingNetworkDelegate
);
4194 // URLRequest::Delegate that logs delegate information when the headers
4195 // are received, when each read completes, and during redirects. Uses
4196 // AsyncDelegateLogger. Can optionally cancel a request in any phase.
4198 // Inherits from TestDelegate to reuse the TestDelegate code to handle
4199 // advancing to the next step in most cases, as well as cancellation.
4200 class AsyncLoggingUrlRequestDelegate
: public TestDelegate
{
4204 CANCEL_ON_RECEIVED_REDIRECT
,
4205 CANCEL_ON_RESPONSE_STARTED
,
4206 CANCEL_ON_READ_COMPLETED
4209 explicit AsyncLoggingUrlRequestDelegate(CancelStage cancel_stage
)
4210 : cancel_stage_(cancel_stage
) {
4211 if (cancel_stage
== CANCEL_ON_RECEIVED_REDIRECT
)
4212 set_cancel_in_received_redirect(true);
4213 else if (cancel_stage
== CANCEL_ON_RESPONSE_STARTED
)
4214 set_cancel_in_response_started(true);
4215 else if (cancel_stage
== CANCEL_ON_READ_COMPLETED
)
4216 set_cancel_in_received_data(true);
4218 ~AsyncLoggingUrlRequestDelegate() override
{}
4220 // URLRequest::Delegate implementation:
4221 void OnReceivedRedirect(URLRequest
* request
,
4222 const RedirectInfo
& redirect_info
,
4223 bool* defer_redirect
) override
{
4224 *defer_redirect
= true;
4225 AsyncDelegateLogger::Run(
4227 LOAD_STATE_WAITING_FOR_DELEGATE
,
4228 LOAD_STATE_WAITING_FOR_DELEGATE
,
4229 LOAD_STATE_WAITING_FOR_DELEGATE
,
4231 &AsyncLoggingUrlRequestDelegate::OnReceivedRedirectLoggingComplete
,
4232 base::Unretained(this), request
, redirect_info
));
4235 void OnResponseStarted(URLRequest
* request
) override
{
4236 AsyncDelegateLogger::Run(
4238 LOAD_STATE_WAITING_FOR_DELEGATE
,
4239 LOAD_STATE_WAITING_FOR_DELEGATE
,
4240 LOAD_STATE_WAITING_FOR_DELEGATE
,
4242 &AsyncLoggingUrlRequestDelegate::OnResponseStartedLoggingComplete
,
4243 base::Unretained(this), request
));
4246 void OnReadCompleted(URLRequest
* request
, int bytes_read
) override
{
4247 AsyncDelegateLogger::Run(
4253 &AsyncLoggingUrlRequestDelegate::AfterReadCompletedLoggingComplete
,
4254 base::Unretained(this), request
, bytes_read
));
4258 void OnReceivedRedirectLoggingComplete(URLRequest
* request
,
4259 const RedirectInfo
& redirect_info
) {
4260 bool defer_redirect
= false;
4261 TestDelegate::OnReceivedRedirect(request
, redirect_info
, &defer_redirect
);
4262 // FollowDeferredRedirect should not be called after cancellation.
4263 if (cancel_stage_
== CANCEL_ON_RECEIVED_REDIRECT
)
4265 if (!defer_redirect
)
4266 request
->FollowDeferredRedirect();
4269 void OnResponseStartedLoggingComplete(URLRequest
* request
) {
4270 // The parent class continues the request.
4271 TestDelegate::OnResponseStarted(request
);
4274 void AfterReadCompletedLoggingComplete(URLRequest
* request
, int bytes_read
) {
4275 // The parent class continues the request.
4276 TestDelegate::OnReadCompleted(request
, bytes_read
);
4279 const CancelStage cancel_stage_
;
4281 DISALLOW_COPY_AND_ASSIGN(AsyncLoggingUrlRequestDelegate
);
4284 // Tests handling of delegate info before a request starts.
4285 TEST_F(URLRequestTestHTTP
, DelegateInfoBeforeStart
) {
4286 ASSERT_TRUE(test_server_
.Start());
4288 TestDelegate request_delegate
;
4289 TestURLRequestContext
context(true);
4290 context
.set_network_delegate(NULL
);
4291 context
.set_net_log(&net_log_
);
4295 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
4296 test_server_
.GetURL("empty.html"), DEFAULT_PRIORITY
, &request_delegate
,
4298 LoadStateWithParam load_state
= r
->GetLoadState();
4299 EXPECT_EQ(LOAD_STATE_IDLE
, load_state
.state
);
4300 EXPECT_EQ(base::string16(), load_state
.param
);
4302 AsyncDelegateLogger::Run(
4304 LOAD_STATE_WAITING_FOR_DELEGATE
,
4305 LOAD_STATE_WAITING_FOR_DELEGATE
,
4307 base::Bind(&URLRequest::Start
, base::Unretained(r
.get())));
4309 base::RunLoop().Run();
4311 EXPECT_EQ(200, r
->GetResponseCode());
4312 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
4315 CapturingNetLog::CapturedEntryList entries
;
4316 net_log_
.GetEntries(&entries
);
4317 size_t log_position
= ExpectLogContainsSomewhereAfter(
4320 NetLog::TYPE_DELEGATE_INFO
,
4321 NetLog::PHASE_BEGIN
);
4323 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
, log_position
);
4325 // Nothing else should add any delegate info to the request.
4326 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4327 entries
, log_position
+ 1, NetLog::TYPE_DELEGATE_INFO
));
4330 // Tests handling of delegate info from a network delegate.
4331 TEST_F(URLRequestTestHTTP
, NetworkDelegateInfo
) {
4332 ASSERT_TRUE(test_server_
.Start());
4334 TestDelegate request_delegate
;
4335 AsyncLoggingNetworkDelegate network_delegate
;
4336 TestURLRequestContext
context(true);
4337 context
.set_network_delegate(&network_delegate
);
4338 context
.set_net_log(&net_log_
);
4342 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
4343 test_server_
.GetURL("simple.html"), DEFAULT_PRIORITY
, &request_delegate
,
4345 LoadStateWithParam load_state
= r
->GetLoadState();
4346 EXPECT_EQ(LOAD_STATE_IDLE
, load_state
.state
);
4347 EXPECT_EQ(base::string16(), load_state
.param
);
4350 base::RunLoop().Run();
4352 EXPECT_EQ(200, r
->GetResponseCode());
4353 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
4354 EXPECT_EQ(1, network_delegate
.created_requests());
4355 EXPECT_EQ(0, network_delegate
.destroyed_requests());
4357 EXPECT_EQ(1, network_delegate
.destroyed_requests());
4359 size_t log_position
= 0;
4360 CapturingNetLog::CapturedEntryList entries
;
4361 net_log_
.GetEntries(&entries
);
4362 for (size_t i
= 0; i
< 3; ++i
) {
4363 log_position
= ExpectLogContainsSomewhereAfter(
4366 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4367 NetLog::PHASE_BEGIN
);
4369 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
,
4372 ASSERT_LT(log_position
, entries
.size());
4373 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
, entries
[log_position
].type
);
4374 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4377 log_position
= AsyncDelegateLogger::ExpectBeforeNetworkEvents(
4378 entries
, log_position
+ 1);
4382 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4383 entries
, log_position
+ 1, NetLog::TYPE_DELEGATE_INFO
));
4386 // Tests handling of delegate info from a network delegate in the case of an
4388 TEST_F(URLRequestTestHTTP
, NetworkDelegateInfoRedirect
) {
4389 ASSERT_TRUE(test_server_
.Start());
4391 TestDelegate request_delegate
;
4392 AsyncLoggingNetworkDelegate network_delegate
;
4393 TestURLRequestContext
context(true);
4394 context
.set_network_delegate(&network_delegate
);
4395 context
.set_net_log(&net_log_
);
4399 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
4400 test_server_
.GetURL("server-redirect?simple.html"), DEFAULT_PRIORITY
,
4401 &request_delegate
, NULL
));
4402 LoadStateWithParam load_state
= r
->GetLoadState();
4403 EXPECT_EQ(LOAD_STATE_IDLE
, load_state
.state
);
4404 EXPECT_EQ(base::string16(), load_state
.param
);
4407 base::RunLoop().Run();
4409 EXPECT_EQ(200, r
->GetResponseCode());
4410 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
4411 EXPECT_EQ(2, network_delegate
.created_requests());
4412 EXPECT_EQ(0, network_delegate
.destroyed_requests());
4414 EXPECT_EQ(1, network_delegate
.destroyed_requests());
4416 size_t log_position
= 0;
4417 CapturingNetLog::CapturedEntryList entries
;
4418 net_log_
.GetEntries(&entries
);
4419 // The NetworkDelegate logged information in OnBeforeURLRequest,
4420 // OnBeforeSendHeaders, and OnHeadersReceived.
4421 for (size_t i
= 0; i
< 3; ++i
) {
4422 log_position
= ExpectLogContainsSomewhereAfter(
4425 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4426 NetLog::PHASE_BEGIN
);
4428 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
,
4431 ASSERT_LT(log_position
, entries
.size());
4432 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
, entries
[log_position
].type
);
4433 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4436 log_position
= AsyncDelegateLogger::ExpectBeforeNetworkEvents(
4437 entries
, log_position
+ 1);
4441 // The URLRequest::Delegate then gets informed about the redirect.
4442 log_position
= ExpectLogContainsSomewhereAfter(
4445 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4446 NetLog::PHASE_BEGIN
);
4448 // The NetworkDelegate logged information in the same three events as before.
4449 for (size_t i
= 0; i
< 3; ++i
) {
4450 log_position
= ExpectLogContainsSomewhereAfter(
4453 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4454 NetLog::PHASE_BEGIN
);
4456 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
,
4459 ASSERT_LT(log_position
, entries
.size());
4460 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
, entries
[log_position
].type
);
4461 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4464 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4465 entries
, log_position
+ 1, NetLog::TYPE_DELEGATE_INFO
));
4468 // Tests handling of delegate info from a network delegate in the case of HTTP
4470 TEST_F(URLRequestTestHTTP
, NetworkDelegateInfoAuth
) {
4471 ASSERT_TRUE(test_server_
.Start());
4473 TestDelegate request_delegate
;
4474 AsyncLoggingNetworkDelegate network_delegate
;
4475 TestURLRequestContext
context(true);
4476 context
.set_network_delegate(&network_delegate
);
4477 context
.set_net_log(&net_log_
);
4481 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
4482 test_server_
.GetURL("auth-basic"), DEFAULT_PRIORITY
, &request_delegate
,
4484 LoadStateWithParam load_state
= r
->GetLoadState();
4485 EXPECT_EQ(LOAD_STATE_IDLE
, load_state
.state
);
4486 EXPECT_EQ(base::string16(), load_state
.param
);
4489 base::RunLoop().Run();
4491 EXPECT_EQ(200, r
->GetResponseCode());
4492 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
4493 EXPECT_EQ(1, network_delegate
.created_requests());
4494 EXPECT_EQ(0, network_delegate
.destroyed_requests());
4496 EXPECT_EQ(1, network_delegate
.destroyed_requests());
4498 size_t log_position
= 0;
4499 CapturingNetLog::CapturedEntryList entries
;
4500 net_log_
.GetEntries(&entries
);
4501 // The NetworkDelegate should have logged information in OnBeforeURLRequest,
4502 // OnBeforeSendHeaders, OnHeadersReceived, OnAuthRequired, and then again in
4503 // OnBeforeURLRequest and OnBeforeSendHeaders.
4504 for (size_t i
= 0; i
< 6; ++i
) {
4505 log_position
= ExpectLogContainsSomewhereAfter(
4508 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4509 NetLog::PHASE_BEGIN
);
4511 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
,
4514 ASSERT_LT(log_position
, entries
.size());
4515 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
, entries
[log_position
].type
);
4516 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4519 log_position
= AsyncDelegateLogger::ExpectBeforeNetworkEvents(
4520 entries
, log_position
+ 1);
4524 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4525 entries
, log_position
+ 1, NetLog::TYPE_DELEGATE_INFO
));
4528 // Tests handling of delegate info from a URLRequest::Delegate.
4529 TEST_F(URLRequestTestHTTP
, URLRequestDelegateInfo
) {
4530 ASSERT_TRUE(test_server_
.Start());
4532 AsyncLoggingUrlRequestDelegate
request_delegate(
4533 AsyncLoggingUrlRequestDelegate::NO_CANCEL
);
4534 TestURLRequestContext
context(true);
4535 context
.set_network_delegate(NULL
);
4536 context
.set_net_log(&net_log_
);
4540 // A chunked response with delays between chunks is used to make sure that
4541 // attempts by the URLRequest delegate to log information while reading the
4542 // body are ignored. Since they are ignored, this test is robust against
4543 // the possibility of multiple reads being combined in the unlikely event
4545 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
4546 test_server_
.GetURL("chunked?waitBetweenChunks=20"), DEFAULT_PRIORITY
,
4547 &request_delegate
, NULL
));
4548 LoadStateWithParam load_state
= r
->GetLoadState();
4550 base::RunLoop().Run();
4552 EXPECT_EQ(200, r
->GetResponseCode());
4553 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
4556 CapturingNetLog::CapturedEntryList entries
;
4557 net_log_
.GetEntries(&entries
);
4559 size_t log_position
= 0;
4561 log_position
= AsyncDelegateLogger::ExpectBeforeNetworkEvents(
4562 entries
, log_position
);
4564 // The delegate info should only have been logged on header complete. Other
4565 // times it should silently be ignored.
4567 ExpectLogContainsSomewhereAfter(entries
,
4569 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4570 NetLog::PHASE_BEGIN
);
4572 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
,
4575 ASSERT_LT(log_position
, entries
.size());
4576 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
, entries
[log_position
].type
);
4577 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4579 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4580 entries
, log_position
+ 1, NetLog::TYPE_DELEGATE_INFO
));
4581 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4582 entries
, log_position
+ 1, NetLog::TYPE_URL_REQUEST_DELEGATE
));
4585 // Tests handling of delegate info from a URLRequest::Delegate in the case of
4586 // an HTTP redirect.
4587 TEST_F(URLRequestTestHTTP
, URLRequestDelegateInfoOnRedirect
) {
4588 ASSERT_TRUE(test_server_
.Start());
4590 AsyncLoggingUrlRequestDelegate
request_delegate(
4591 AsyncLoggingUrlRequestDelegate::NO_CANCEL
);
4592 TestURLRequestContext
context(true);
4593 context
.set_network_delegate(NULL
);
4594 context
.set_net_log(&net_log_
);
4598 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
4599 test_server_
.GetURL("server-redirect?simple.html"), DEFAULT_PRIORITY
,
4600 &request_delegate
, NULL
));
4601 LoadStateWithParam load_state
= r
->GetLoadState();
4603 base::RunLoop().Run();
4605 EXPECT_EQ(200, r
->GetResponseCode());
4606 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
4609 CapturingNetLog::CapturedEntryList entries
;
4610 net_log_
.GetEntries(&entries
);
4612 // Delegate info should only have been logged in OnReceivedRedirect and
4613 // OnResponseStarted.
4614 size_t log_position
= 0;
4615 for (int i
= 0; i
< 2; ++i
) {
4617 log_position
= AsyncDelegateLogger::ExpectBeforeNetworkEvents(
4618 entries
, log_position
) + 1;
4621 log_position
= ExpectLogContainsSomewhereAfter(
4624 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4625 NetLog::PHASE_BEGIN
);
4627 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
,
4630 ASSERT_LT(log_position
, entries
.size());
4631 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
, entries
[log_position
].type
);
4632 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4635 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4636 entries
, log_position
+ 1, NetLog::TYPE_DELEGATE_INFO
));
4637 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4638 entries
, log_position
+ 1, NetLog::TYPE_URL_REQUEST_DELEGATE
));
4641 // Tests handling of delegate info from a URLRequest::Delegate in the case of
4642 // an HTTP redirect, with cancellation at various points.
4643 TEST_F(URLRequestTestHTTP
, URLRequestDelegateOnRedirectCancelled
) {
4644 ASSERT_TRUE(test_server_
.Start());
4646 const AsyncLoggingUrlRequestDelegate::CancelStage kCancelStages
[] = {
4647 AsyncLoggingUrlRequestDelegate::CANCEL_ON_RECEIVED_REDIRECT
,
4648 AsyncLoggingUrlRequestDelegate::CANCEL_ON_RESPONSE_STARTED
,
4649 AsyncLoggingUrlRequestDelegate::CANCEL_ON_READ_COMPLETED
,
4652 for (size_t test_case
= 0; test_case
< arraysize(kCancelStages
);
4654 AsyncLoggingUrlRequestDelegate
request_delegate(kCancelStages
[test_case
]);
4655 TestURLRequestContext
context(true);
4656 CapturingNetLog net_log
;
4657 context
.set_network_delegate(NULL
);
4658 context
.set_net_log(&net_log
);
4662 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
4663 test_server_
.GetURL("server-redirect?simple.html"), DEFAULT_PRIORITY
,
4664 &request_delegate
, NULL
));
4665 LoadStateWithParam load_state
= r
->GetLoadState();
4667 base::RunLoop().Run();
4668 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
4671 CapturingNetLog::CapturedEntryList entries
;
4672 net_log
.GetEntries(&entries
);
4674 // Delegate info is always logged in both OnReceivedRedirect and
4675 // OnResponseStarted. In the CANCEL_ON_RECEIVED_REDIRECT, the
4676 // OnResponseStarted delegate call is after cancellation, but logging is
4677 // still currently supported in that call.
4678 size_t log_position
= 0;
4679 for (int i
= 0; i
< 2; ++i
) {
4681 log_position
= AsyncDelegateLogger::ExpectBeforeNetworkEvents(
4682 entries
, log_position
) + 1;
4685 log_position
= ExpectLogContainsSomewhereAfter(
4688 NetLog::TYPE_URL_REQUEST_DELEGATE
,
4689 NetLog::PHASE_BEGIN
);
4691 log_position
= AsyncDelegateLogger::CheckDelegateInfo(entries
,
4694 ASSERT_LT(log_position
, entries
.size());
4695 EXPECT_EQ(NetLog::TYPE_URL_REQUEST_DELEGATE
, entries
[log_position
].type
);
4696 EXPECT_EQ(NetLog::PHASE_END
, entries
[log_position
].phase
);
4699 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4700 entries
, log_position
+ 1, NetLog::TYPE_DELEGATE_INFO
));
4701 EXPECT_FALSE(LogContainsEntryWithTypeAfter(
4702 entries
, log_position
+ 1, NetLog::TYPE_URL_REQUEST_DELEGATE
));
4708 const char kExtraHeader
[] = "Allow-Snafu";
4709 const char kExtraValue
[] = "fubar";
4711 class RedirectWithAdditionalHeadersDelegate
: public TestDelegate
{
4712 void OnReceivedRedirect(URLRequest
* request
,
4713 const RedirectInfo
& redirect_info
,
4714 bool* defer_redirect
) override
{
4715 TestDelegate::OnReceivedRedirect(request
, redirect_info
, defer_redirect
);
4716 request
->SetExtraRequestHeaderByName(kExtraHeader
, kExtraValue
, false);
4722 TEST_F(URLRequestTestHTTP
, RedirectWithAdditionalHeadersTest
) {
4723 ASSERT_TRUE(test_server_
.Start());
4725 GURL destination_url
= test_server_
.GetURL(
4726 "echoheader?" + std::string(kExtraHeader
));
4727 GURL original_url
= test_server_
.GetURL(
4728 "server-redirect?" + destination_url
.spec());
4729 RedirectWithAdditionalHeadersDelegate d
;
4730 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
4731 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
4733 base::RunLoop().Run();
4736 const HttpRequestHeaders
& headers
= req
->extra_request_headers();
4737 EXPECT_TRUE(headers
.GetHeader(kExtraHeader
, &value
));
4738 EXPECT_EQ(kExtraValue
, value
);
4739 EXPECT_FALSE(req
->is_pending());
4740 EXPECT_FALSE(req
->is_redirecting());
4741 EXPECT_EQ(kExtraValue
, d
.data_received());
4746 const char kExtraHeaderToRemove
[] = "To-Be-Removed";
4748 class RedirectWithHeaderRemovalDelegate
: public TestDelegate
{
4749 void OnReceivedRedirect(URLRequest
* request
,
4750 const RedirectInfo
& redirect_info
,
4751 bool* defer_redirect
) override
{
4752 TestDelegate::OnReceivedRedirect(request
, redirect_info
, defer_redirect
);
4753 request
->RemoveRequestHeaderByName(kExtraHeaderToRemove
);
4759 TEST_F(URLRequestTestHTTP
, RedirectWithHeaderRemovalTest
) {
4760 ASSERT_TRUE(test_server_
.Start());
4762 GURL destination_url
= test_server_
.GetURL(
4763 "echoheader?" + std::string(kExtraHeaderToRemove
));
4764 GURL original_url
= test_server_
.GetURL(
4765 "server-redirect?" + destination_url
.spec());
4766 RedirectWithHeaderRemovalDelegate d
;
4767 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
4768 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
4769 req
->SetExtraRequestHeaderByName(kExtraHeaderToRemove
, "dummy", false);
4771 base::RunLoop().Run();
4774 const HttpRequestHeaders
& headers
= req
->extra_request_headers();
4775 EXPECT_FALSE(headers
.GetHeader(kExtraHeaderToRemove
, &value
));
4776 EXPECT_FALSE(req
->is_pending());
4777 EXPECT_FALSE(req
->is_redirecting());
4778 EXPECT_EQ("None", d
.data_received());
4781 TEST_F(URLRequestTestHTTP
, CancelTest
) {
4784 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4785 GURL("http://www.google.com/"), DEFAULT_PRIORITY
, &d
, NULL
));
4788 EXPECT_TRUE(r
->is_pending());
4792 base::RunLoop().Run();
4794 // We expect to receive OnResponseStarted even though the request has been
4796 EXPECT_EQ(1, d
.response_started_count());
4797 EXPECT_EQ(0, d
.bytes_received());
4798 EXPECT_FALSE(d
.received_data_before_response());
4802 TEST_F(URLRequestTestHTTP
, CancelTest2
) {
4803 ASSERT_TRUE(test_server_
.Start());
4807 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4808 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
4810 d
.set_cancel_in_response_started(true);
4813 EXPECT_TRUE(r
->is_pending());
4815 base::RunLoop().Run();
4817 EXPECT_EQ(1, d
.response_started_count());
4818 EXPECT_EQ(0, d
.bytes_received());
4819 EXPECT_FALSE(d
.received_data_before_response());
4820 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
4824 TEST_F(URLRequestTestHTTP
, CancelTest3
) {
4825 ASSERT_TRUE(test_server_
.Start());
4829 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4830 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
4832 d
.set_cancel_in_received_data(true);
4835 EXPECT_TRUE(r
->is_pending());
4837 base::RunLoop().Run();
4839 EXPECT_EQ(1, d
.response_started_count());
4840 // There is no guarantee about how much data was received
4841 // before the cancel was issued. It could have been 0 bytes,
4842 // or it could have been all the bytes.
4843 // EXPECT_EQ(0, d.bytes_received());
4844 EXPECT_FALSE(d
.received_data_before_response());
4845 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
4849 TEST_F(URLRequestTestHTTP
, CancelTest4
) {
4850 ASSERT_TRUE(test_server_
.Start());
4854 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4855 test_server_
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
4858 EXPECT_TRUE(r
->is_pending());
4860 // The request will be implicitly canceled when it is destroyed. The
4861 // test delegate must not post a quit message when this happens because
4862 // this test doesn't actually have a message loop. The quit message would
4863 // get put on this thread's message queue and the next test would exit
4864 // early, causing problems.
4865 d
.set_quit_on_complete(false);
4867 // expect things to just cleanup properly.
4869 // we won't actually get a received reponse here because we've never run the
4871 EXPECT_FALSE(d
.received_data_before_response());
4872 EXPECT_EQ(0, d
.bytes_received());
4875 TEST_F(URLRequestTestHTTP
, CancelTest5
) {
4876 ASSERT_TRUE(test_server_
.Start());
4881 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4882 test_server_
.GetURL("cachetime"), DEFAULT_PRIORITY
, &d
, NULL
));
4884 base::RunLoop().Run();
4885 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
4888 // cancel read from cache (see bug 990242)
4891 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4892 test_server_
.GetURL("cachetime"), DEFAULT_PRIORITY
, &d
, NULL
));
4895 base::RunLoop().Run();
4897 EXPECT_EQ(URLRequestStatus::CANCELED
, r
->status().status());
4898 EXPECT_EQ(1, d
.response_started_count());
4899 EXPECT_EQ(0, d
.bytes_received());
4900 EXPECT_FALSE(d
.received_data_before_response());
4904 TEST_F(URLRequestTestHTTP
, PostTest
) {
4905 ASSERT_TRUE(test_server_
.Start());
4906 HTTPUploadDataOperationTest("POST");
4909 TEST_F(URLRequestTestHTTP
, PutTest
) {
4910 ASSERT_TRUE(test_server_
.Start());
4911 HTTPUploadDataOperationTest("PUT");
4914 TEST_F(URLRequestTestHTTP
, PostEmptyTest
) {
4915 ASSERT_TRUE(test_server_
.Start());
4919 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4920 test_server_
.GetURL("echo"), DEFAULT_PRIORITY
, &d
, NULL
));
4921 r
->set_method("POST");
4924 EXPECT_TRUE(r
->is_pending());
4926 base::RunLoop().Run();
4928 ASSERT_EQ(1, d
.response_started_count())
4929 << "request failed: " << r
->status().status()
4930 << ", error: " << r
->status().error();
4932 EXPECT_FALSE(d
.received_data_before_response());
4933 EXPECT_TRUE(d
.data_received().empty());
4937 TEST_F(URLRequestTestHTTP
, PostFileTest
) {
4938 ASSERT_TRUE(test_server_
.Start());
4942 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4943 test_server_
.GetURL("echo"), DEFAULT_PRIORITY
, &d
, NULL
));
4944 r
->set_method("POST");
4947 PathService::Get(base::DIR_EXE
, &dir
);
4948 base::SetCurrentDirectory(dir
);
4950 ScopedVector
<UploadElementReader
> element_readers
;
4952 base::FilePath path
;
4953 PathService::Get(base::DIR_SOURCE_ROOT
, &path
);
4954 path
= path
.Append(FILE_PATH_LITERAL("net"));
4955 path
= path
.Append(FILE_PATH_LITERAL("data"));
4956 path
= path
.Append(FILE_PATH_LITERAL("url_request_unittest"));
4957 path
= path
.Append(FILE_PATH_LITERAL("with-headers.html"));
4958 element_readers
.push_back(
4959 new UploadFileElementReader(base::MessageLoopProxy::current().get(),
4964 r
->set_upload(make_scoped_ptr
<UploadDataStream
>(
4965 new ElementsUploadDataStream(element_readers
.Pass(), 0)));
4968 EXPECT_TRUE(r
->is_pending());
4970 base::RunLoop().Run();
4973 ASSERT_EQ(true, base::GetFileSize(path
, &size64
));
4974 ASSERT_LE(size64
, std::numeric_limits
<int>::max());
4975 int size
= static_cast<int>(size64
);
4976 scoped_ptr
<char[]> buf(new char[size
]);
4978 ASSERT_EQ(size
, base::ReadFile(path
, buf
.get(), size
));
4980 ASSERT_EQ(1, d
.response_started_count())
4981 << "request failed: " << r
->status().status()
4982 << ", error: " << r
->status().error();
4984 EXPECT_FALSE(d
.received_data_before_response());
4986 EXPECT_EQ(size
, d
.bytes_received());
4987 EXPECT_EQ(std::string(&buf
[0], size
), d
.data_received());
4991 TEST_F(URLRequestTestHTTP
, PostUnreadableFileTest
) {
4992 ASSERT_TRUE(test_server_
.Start());
4996 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
4997 test_server_
.GetURL("echo"), DEFAULT_PRIORITY
, &d
, NULL
));
4998 r
->set_method("POST");
5000 ScopedVector
<UploadElementReader
> element_readers
;
5002 element_readers
.push_back(new UploadFileElementReader(
5003 base::MessageLoopProxy::current().get(),
5004 base::FilePath(FILE_PATH_LITERAL(
5005 "c:\\path\\to\\non\\existant\\file.randomness.12345")),
5009 r
->set_upload(make_scoped_ptr
<UploadDataStream
>(
5010 new ElementsUploadDataStream(element_readers
.Pass(), 0)));
5013 EXPECT_TRUE(r
->is_pending());
5015 base::RunLoop().Run();
5017 EXPECT_TRUE(d
.request_failed());
5018 EXPECT_FALSE(d
.received_data_before_response());
5019 EXPECT_EQ(0, d
.bytes_received());
5020 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
5021 EXPECT_EQ(ERR_FILE_NOT_FOUND
, r
->status().error());
5025 TEST_F(URLRequestTestHTTP
, TestPostChunkedDataBeforeStart
) {
5026 ASSERT_TRUE(test_server_
.Start());
5030 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5031 test_server_
.GetURL("echo"), DEFAULT_PRIORITY
, &d
, NULL
));
5032 r
->EnableChunkedUpload();
5033 r
->set_method("POST");
5034 AddChunksToUpload(r
.get());
5036 EXPECT_TRUE(r
->is_pending());
5038 base::RunLoop().Run();
5040 VerifyReceivedDataMatchesChunks(r
.get(), &d
);
5044 TEST_F(URLRequestTestHTTP
, TestPostChunkedDataJustAfterStart
) {
5045 ASSERT_TRUE(test_server_
.Start());
5049 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5050 test_server_
.GetURL("echo"), DEFAULT_PRIORITY
, &d
, NULL
));
5051 r
->EnableChunkedUpload();
5052 r
->set_method("POST");
5054 EXPECT_TRUE(r
->is_pending());
5055 AddChunksToUpload(r
.get());
5056 base::RunLoop().Run();
5058 VerifyReceivedDataMatchesChunks(r
.get(), &d
);
5062 TEST_F(URLRequestTestHTTP
, TestPostChunkedDataAfterStart
) {
5063 ASSERT_TRUE(test_server_
.Start());
5067 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5068 test_server_
.GetURL("echo"), DEFAULT_PRIORITY
, &d
, NULL
));
5069 r
->EnableChunkedUpload();
5070 r
->set_method("POST");
5072 EXPECT_TRUE(r
->is_pending());
5074 base::RunLoop().RunUntilIdle();
5075 AddChunksToUpload(r
.get());
5076 base::RunLoop().Run();
5078 VerifyReceivedDataMatchesChunks(r
.get(), &d
);
5082 TEST_F(URLRequestTestHTTP
, ResponseHeadersTest
) {
5083 ASSERT_TRUE(test_server_
.Start());
5086 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5087 test_server_
.GetURL("files/with-headers.html"), DEFAULT_PRIORITY
, &d
,
5090 base::RunLoop().Run();
5092 const HttpResponseHeaders
* headers
= req
->response_headers();
5094 // Simple sanity check that response_info() accesses the same data.
5095 EXPECT_EQ(headers
, req
->response_info().headers
.get());
5098 EXPECT_TRUE(headers
->GetNormalizedHeader("cache-control", &header
));
5099 EXPECT_EQ("private", header
);
5102 EXPECT_TRUE(headers
->GetNormalizedHeader("content-type", &header
));
5103 EXPECT_EQ("text/html; charset=ISO-8859-1", header
);
5105 // The response has two "X-Multiple-Entries" headers.
5106 // This verfies our output has them concatenated together.
5108 EXPECT_TRUE(headers
->GetNormalizedHeader("x-multiple-entries", &header
));
5109 EXPECT_EQ("a, b", header
);
5112 TEST_F(URLRequestTestHTTP
, ProcessSTS
) {
5113 SpawnedTestServer::SSLOptions ssl_options
;
5114 SpawnedTestServer
https_test_server(
5115 SpawnedTestServer::TYPE_HTTPS
,
5117 base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest")));
5118 ASSERT_TRUE(https_test_server
.Start());
5121 scoped_ptr
<URLRequest
> request(default_context_
.CreateRequest(
5122 https_test_server
.GetURL("files/hsts-headers.html"), DEFAULT_PRIORITY
, &d
,
5125 base::RunLoop().Run();
5127 TransportSecurityState
* security_state
=
5128 default_context_
.transport_security_state();
5129 TransportSecurityState::DomainState domain_state
;
5130 EXPECT_TRUE(security_state
->GetDynamicDomainState(
5131 SpawnedTestServer::kLocalhost
, &domain_state
));
5132 EXPECT_EQ(TransportSecurityState::DomainState::MODE_FORCE_HTTPS
,
5133 domain_state
.sts
.upgrade_mode
);
5134 EXPECT_TRUE(domain_state
.sts
.include_subdomains
);
5135 EXPECT_FALSE(domain_state
.pkp
.include_subdomains
);
5136 #if defined(OS_ANDROID)
5137 // Android's CertVerifyProc does not (yet) handle pins.
5139 EXPECT_FALSE(domain_state
.HasPublicKeyPins());
5143 // Android's CertVerifyProc does not (yet) handle pins. Therefore, it will
5144 // reject HPKP headers, and a test setting only HPKP headers will fail (no
5145 // DomainState present because header rejected).
5146 #if defined(OS_ANDROID)
5147 #define MAYBE_ProcessPKP DISABLED_ProcessPKP
5149 #define MAYBE_ProcessPKP ProcessPKP
5152 // Tests that enabling HPKP on a domain does not affect the HSTS
5153 // validity/expiration.
5154 TEST_F(URLRequestTestHTTP
, MAYBE_ProcessPKP
) {
5155 SpawnedTestServer::SSLOptions ssl_options
;
5156 SpawnedTestServer
https_test_server(
5157 SpawnedTestServer::TYPE_HTTPS
,
5159 base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest")));
5160 ASSERT_TRUE(https_test_server
.Start());
5163 scoped_ptr
<URLRequest
> request(default_context_
.CreateRequest(
5164 https_test_server
.GetURL("files/hpkp-headers.html"), DEFAULT_PRIORITY
, &d
,
5167 base::RunLoop().Run();
5169 TransportSecurityState
* security_state
=
5170 default_context_
.transport_security_state();
5171 TransportSecurityState::DomainState domain_state
;
5172 EXPECT_TRUE(security_state
->GetDynamicDomainState(
5173 SpawnedTestServer::kLocalhost
, &domain_state
));
5174 EXPECT_EQ(TransportSecurityState::DomainState::MODE_DEFAULT
,
5175 domain_state
.sts
.upgrade_mode
);
5176 EXPECT_FALSE(domain_state
.sts
.include_subdomains
);
5177 EXPECT_FALSE(domain_state
.pkp
.include_subdomains
);
5178 EXPECT_TRUE(domain_state
.HasPublicKeyPins());
5179 EXPECT_NE(domain_state
.sts
.expiry
, domain_state
.pkp
.expiry
);
5182 TEST_F(URLRequestTestHTTP
, ProcessSTSOnce
) {
5183 SpawnedTestServer::SSLOptions ssl_options
;
5184 SpawnedTestServer
https_test_server(
5185 SpawnedTestServer::TYPE_HTTPS
,
5187 base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest")));
5188 ASSERT_TRUE(https_test_server
.Start());
5191 scoped_ptr
<URLRequest
> request(default_context_
.CreateRequest(
5192 https_test_server
.GetURL("files/hsts-multiple-headers.html"),
5193 DEFAULT_PRIORITY
, &d
, NULL
));
5195 base::RunLoop().Run();
5197 // We should have set parameters from the first header, not the second.
5198 TransportSecurityState
* security_state
=
5199 default_context_
.transport_security_state();
5200 TransportSecurityState::DomainState domain_state
;
5201 EXPECT_TRUE(security_state
->GetDynamicDomainState(
5202 SpawnedTestServer::kLocalhost
, &domain_state
));
5203 EXPECT_EQ(TransportSecurityState::DomainState::MODE_FORCE_HTTPS
,
5204 domain_state
.sts
.upgrade_mode
);
5205 EXPECT_FALSE(domain_state
.sts
.include_subdomains
);
5206 EXPECT_FALSE(domain_state
.pkp
.include_subdomains
);
5209 TEST_F(URLRequestTestHTTP
, ProcessSTSAndPKP
) {
5210 SpawnedTestServer::SSLOptions ssl_options
;
5211 SpawnedTestServer
https_test_server(
5212 SpawnedTestServer::TYPE_HTTPS
,
5214 base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest")));
5215 ASSERT_TRUE(https_test_server
.Start());
5218 scoped_ptr
<URLRequest
> request(default_context_
.CreateRequest(
5219 https_test_server
.GetURL("files/hsts-and-hpkp-headers.html"),
5220 DEFAULT_PRIORITY
, &d
, NULL
));
5222 base::RunLoop().Run();
5224 // We should have set parameters from the first header, not the second.
5225 TransportSecurityState
* security_state
=
5226 default_context_
.transport_security_state();
5227 TransportSecurityState::DomainState domain_state
;
5228 EXPECT_TRUE(security_state
->GetDynamicDomainState(
5229 SpawnedTestServer::kLocalhost
, &domain_state
));
5230 EXPECT_EQ(TransportSecurityState::DomainState::MODE_FORCE_HTTPS
,
5231 domain_state
.sts
.upgrade_mode
);
5232 #if defined(OS_ANDROID)
5233 // Android's CertVerifyProc does not (yet) handle pins.
5235 EXPECT_TRUE(domain_state
.HasPublicKeyPins());
5237 EXPECT_NE(domain_state
.sts
.expiry
, domain_state
.pkp
.expiry
);
5239 // Even though there is an HSTS header asserting includeSubdomains, it is
5240 // the *second* such header, and we MUST process only the first.
5241 EXPECT_FALSE(domain_state
.sts
.include_subdomains
);
5242 // includeSubdomains does not occur in the test HPKP header.
5243 EXPECT_FALSE(domain_state
.pkp
.include_subdomains
);
5246 // Tests that when multiple HPKP headers are present, asserting different
5247 // policies, that only the first such policy is processed.
5248 TEST_F(URLRequestTestHTTP
, ProcessSTSAndPKP2
) {
5249 SpawnedTestServer::SSLOptions ssl_options
;
5250 SpawnedTestServer
https_test_server(
5251 SpawnedTestServer::TYPE_HTTPS
,
5253 base::FilePath(FILE_PATH_LITERAL("net/data/url_request_unittest")));
5254 ASSERT_TRUE(https_test_server
.Start());
5257 scoped_ptr
<URLRequest
> request(default_context_
.CreateRequest(
5258 https_test_server
.GetURL("files/hsts-and-hpkp-headers2.html"),
5259 DEFAULT_PRIORITY
, &d
, NULL
));
5261 base::RunLoop().Run();
5263 TransportSecurityState
* security_state
=
5264 default_context_
.transport_security_state();
5265 TransportSecurityState::DomainState domain_state
;
5266 EXPECT_TRUE(security_state
->GetDynamicDomainState(
5267 SpawnedTestServer::kLocalhost
, &domain_state
));
5268 EXPECT_EQ(TransportSecurityState::DomainState::MODE_FORCE_HTTPS
,
5269 domain_state
.sts
.upgrade_mode
);
5270 #if defined(OS_ANDROID)
5271 // Android's CertVerifyProc does not (yet) handle pins.
5273 EXPECT_TRUE(domain_state
.HasPublicKeyPins());
5275 EXPECT_NE(domain_state
.sts
.expiry
, domain_state
.pkp
.expiry
);
5277 EXPECT_TRUE(domain_state
.sts
.include_subdomains
);
5278 EXPECT_FALSE(domain_state
.pkp
.include_subdomains
);
5281 TEST_F(URLRequestTestHTTP
, ContentTypeNormalizationTest
) {
5282 ASSERT_TRUE(test_server_
.Start());
5285 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5286 test_server_
.GetURL("files/content-type-normalization.html"),
5287 DEFAULT_PRIORITY
, &d
, NULL
));
5289 base::RunLoop().Run();
5291 std::string mime_type
;
5292 req
->GetMimeType(&mime_type
);
5293 EXPECT_EQ("text/html", mime_type
);
5295 std::string charset
;
5296 req
->GetCharset(&charset
);
5297 EXPECT_EQ("utf-8", charset
);
5301 TEST_F(URLRequestTestHTTP
, ProtocolHandlerAndFactoryRestrictDataRedirects
) {
5302 // Test URLRequestJobFactory::ProtocolHandler::IsSafeRedirectTarget().
5303 GURL
data_url("data:,foo");
5304 DataProtocolHandler data_protocol_handler
;
5305 EXPECT_FALSE(data_protocol_handler
.IsSafeRedirectTarget(data_url
));
5307 // Test URLRequestJobFactoryImpl::IsSafeRedirectTarget().
5308 EXPECT_FALSE(job_factory_
->IsSafeRedirectTarget(data_url
));
5311 #if !defined(DISABLE_FILE_SUPPORT)
5312 TEST_F(URLRequestTestHTTP
, ProtocolHandlerAndFactoryRestrictFileRedirects
) {
5313 // Test URLRequestJobFactory::ProtocolHandler::IsSafeRedirectTarget().
5314 GURL
file_url("file:///foo.txt");
5315 FileProtocolHandler
file_protocol_handler(base::MessageLoopProxy::current());
5316 EXPECT_FALSE(file_protocol_handler
.IsSafeRedirectTarget(file_url
));
5318 // Test URLRequestJobFactoryImpl::IsSafeRedirectTarget().
5319 EXPECT_FALSE(job_factory_
->IsSafeRedirectTarget(file_url
));
5322 TEST_F(URLRequestTestHTTP
, RestrictFileRedirects
) {
5323 ASSERT_TRUE(test_server_
.Start());
5326 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5327 test_server_
.GetURL("files/redirect-to-file.html"), DEFAULT_PRIORITY
, &d
,
5330 base::RunLoop().Run();
5332 EXPECT_EQ(URLRequestStatus::FAILED
, req
->status().status());
5333 EXPECT_EQ(ERR_UNSAFE_REDIRECT
, req
->status().error());
5335 #endif // !defined(DISABLE_FILE_SUPPORT)
5337 TEST_F(URLRequestTestHTTP
, RestrictDataRedirects
) {
5338 ASSERT_TRUE(test_server_
.Start());
5341 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5342 test_server_
.GetURL("files/redirect-to-data.html"), DEFAULT_PRIORITY
, &d
,
5345 base::MessageLoop::current()->Run();
5347 EXPECT_EQ(URLRequestStatus::FAILED
, req
->status().status());
5348 EXPECT_EQ(ERR_UNSAFE_REDIRECT
, req
->status().error());
5351 TEST_F(URLRequestTestHTTP
, RedirectToInvalidURL
) {
5352 ASSERT_TRUE(test_server_
.Start());
5355 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5356 test_server_
.GetURL("files/redirect-to-invalid-url.html"),
5357 DEFAULT_PRIORITY
, &d
, NULL
));
5359 base::RunLoop().Run();
5361 EXPECT_EQ(URLRequestStatus::FAILED
, req
->status().status());
5362 EXPECT_EQ(ERR_INVALID_URL
, req
->status().error());
5365 // Make sure redirects are cached, despite not reading their bodies.
5366 TEST_F(URLRequestTestHTTP
, CacheRedirect
) {
5367 ASSERT_TRUE(test_server_
.Start());
5369 test_server_
.GetURL("files/redirect302-to-echo-cacheable");
5373 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5374 redirect_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5376 base::RunLoop().Run();
5377 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5378 EXPECT_EQ(1, d
.received_redirect_count());
5379 EXPECT_EQ(test_server_
.GetURL("echo"), req
->url());
5384 d
.set_quit_on_redirect(true);
5385 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5386 redirect_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5388 base::RunLoop().Run();
5390 EXPECT_EQ(1, d
.received_redirect_count());
5391 EXPECT_EQ(0, d
.response_started_count());
5392 EXPECT_TRUE(req
->was_cached());
5394 req
->FollowDeferredRedirect();
5395 base::RunLoop().Run();
5396 EXPECT_EQ(1, d
.received_redirect_count());
5397 EXPECT_EQ(1, d
.response_started_count());
5398 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5399 EXPECT_EQ(test_server_
.GetURL("echo"), req
->url());
5403 // Make sure a request isn't cached when a NetworkDelegate forces a redirect
5404 // when the headers are read, since the body won't have been read.
5405 TEST_F(URLRequestTestHTTP
, NoCacheOnNetworkDelegateRedirect
) {
5406 ASSERT_TRUE(test_server_
.Start());
5407 // URL that is normally cached.
5408 GURL initial_url
= test_server_
.GetURL("cachetime");
5411 // Set up the TestNetworkDelegate tp force a redirect.
5412 GURL redirect_to_url
= test_server_
.GetURL("echo");
5413 default_network_delegate_
.set_redirect_on_headers_received_url(
5417 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5418 initial_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5420 base::RunLoop().Run();
5421 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5422 EXPECT_EQ(1, d
.received_redirect_count());
5423 EXPECT_EQ(redirect_to_url
, req
->url());
5428 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5429 initial_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5431 base::RunLoop().Run();
5433 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5434 EXPECT_FALSE(req
->was_cached());
5435 EXPECT_EQ(0, d
.received_redirect_count());
5436 EXPECT_EQ(initial_url
, req
->url());
5440 // Tests that redirection to an unsafe URL is allowed when it has been marked as
5442 TEST_F(URLRequestTestHTTP
, UnsafeRedirectToWhitelistedUnsafeURL
) {
5443 ASSERT_TRUE(test_server_
.Start());
5445 GURL
unsafe_url("data:text/html,this-is-considered-an-unsafe-url");
5446 default_network_delegate_
.set_redirect_on_headers_received_url(unsafe_url
);
5447 default_network_delegate_
.set_allowed_unsafe_redirect_url(unsafe_url
);
5451 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5452 test_server_
.GetURL("whatever"), DEFAULT_PRIORITY
, &d
, NULL
));
5455 base::RunLoop().Run();
5457 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
5459 EXPECT_EQ(2U, r
->url_chain().size());
5460 EXPECT_EQ(OK
, r
->status().error());
5461 EXPECT_EQ(unsafe_url
, r
->url());
5462 EXPECT_EQ("this-is-considered-an-unsafe-url", d
.data_received());
5466 // Tests that a redirect to a different unsafe URL is blocked, even after adding
5467 // some other URL to the whitelist.
5468 TEST_F(URLRequestTestHTTP
, UnsafeRedirectToDifferentUnsafeURL
) {
5469 ASSERT_TRUE(test_server_
.Start());
5471 GURL
unsafe_url("data:text/html,something");
5472 GURL
different_unsafe_url("data:text/html,something-else");
5473 default_network_delegate_
.set_redirect_on_headers_received_url(unsafe_url
);
5474 default_network_delegate_
.set_allowed_unsafe_redirect_url(
5475 different_unsafe_url
);
5479 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5480 test_server_
.GetURL("whatever"), DEFAULT_PRIORITY
, &d
, NULL
));
5483 base::RunLoop().Run();
5485 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
5486 EXPECT_EQ(ERR_UNSAFE_REDIRECT
, r
->status().error());
5490 // Redirects from an URL with fragment to an unsafe URL with fragment should
5491 // be allowed, and the reference fragment of the target URL should be preserved.
5492 TEST_F(URLRequestTestHTTP
, UnsafeRedirectWithDifferentReferenceFragment
) {
5493 ASSERT_TRUE(test_server_
.Start());
5495 GURL
original_url(test_server_
.GetURL("original#fragment1"));
5496 GURL
unsafe_url("data:,url-marked-safe-and-used-in-redirect#fragment2");
5497 GURL
expected_url("data:,url-marked-safe-and-used-in-redirect#fragment2");
5499 default_network_delegate_
.set_redirect_on_headers_received_url(unsafe_url
);
5500 default_network_delegate_
.set_allowed_unsafe_redirect_url(unsafe_url
);
5504 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5505 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5508 base::RunLoop().Run();
5510 EXPECT_EQ(2U, r
->url_chain().size());
5511 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
5512 EXPECT_EQ(OK
, r
->status().error());
5513 EXPECT_EQ(original_url
, r
->original_url());
5514 EXPECT_EQ(expected_url
, r
->url());
5518 // When a delegate has specified a safe redirect URL, but it does not match the
5519 // redirect target, then do not prevent the reference fragment from being added.
5520 TEST_F(URLRequestTestHTTP
, RedirectWithReferenceFragmentAndUnrelatedUnsafeUrl
) {
5521 ASSERT_TRUE(test_server_
.Start());
5523 GURL
original_url(test_server_
.GetURL("original#expected-fragment"));
5524 GURL
unsafe_url("data:text/html,this-url-does-not-match-redirect-url");
5525 GURL
redirect_url(test_server_
.GetURL("target"));
5526 GURL
expected_redirect_url(test_server_
.GetURL("target#expected-fragment"));
5528 default_network_delegate_
.set_redirect_on_headers_received_url(redirect_url
);
5529 default_network_delegate_
.set_allowed_unsafe_redirect_url(unsafe_url
);
5533 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5534 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5537 base::RunLoop().Run();
5539 EXPECT_EQ(2U, r
->url_chain().size());
5540 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
5541 EXPECT_EQ(OK
, r
->status().error());
5542 EXPECT_EQ(original_url
, r
->original_url());
5543 EXPECT_EQ(expected_redirect_url
, r
->url());
5547 // When a delegate has specified a safe redirect URL, assume that the redirect
5548 // URL should not be changed. In particular, the reference fragment should not
5550 TEST_F(URLRequestTestHTTP
, RedirectWithReferenceFragment
) {
5551 ASSERT_TRUE(test_server_
.Start());
5553 GURL
original_url(test_server_
.GetURL("original#should-not-be-appended"));
5554 GURL
redirect_url("data:text/html,expect-no-reference-fragment");
5556 default_network_delegate_
.set_redirect_on_headers_received_url(redirect_url
);
5557 default_network_delegate_
.set_allowed_unsafe_redirect_url(redirect_url
);
5561 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5562 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5565 base::RunLoop().Run();
5567 EXPECT_EQ(2U, r
->url_chain().size());
5568 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
5569 EXPECT_EQ(OK
, r
->status().error());
5570 EXPECT_EQ(original_url
, r
->original_url());
5571 EXPECT_EQ(redirect_url
, r
->url());
5575 // When a URLRequestRedirectJob is created, the redirection must be followed and
5576 // the reference fragment of the target URL must not be modified.
5577 TEST_F(URLRequestTestHTTP
, RedirectJobWithReferenceFragment
) {
5578 ASSERT_TRUE(test_server_
.Start());
5580 GURL
original_url(test_server_
.GetURL("original#should-not-be-appended"));
5581 GURL
redirect_url(test_server_
.GetURL("echo"));
5584 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5585 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5587 URLRequestRedirectJob
* job
= new URLRequestRedirectJob(
5588 r
.get(), &default_network_delegate_
, redirect_url
,
5589 URLRequestRedirectJob::REDIRECT_302_FOUND
, "Very Good Reason");
5590 AddTestInterceptor()->set_main_intercept_job(job
);
5593 base::RunLoop().Run();
5595 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
5596 EXPECT_EQ(OK
, r
->status().error());
5597 EXPECT_EQ(original_url
, r
->original_url());
5598 EXPECT_EQ(redirect_url
, r
->url());
5601 TEST_F(URLRequestTestHTTP
, NoUserPassInReferrer
) {
5602 ASSERT_TRUE(test_server_
.Start());
5605 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5606 test_server_
.GetURL("echoheader?Referer"), DEFAULT_PRIORITY
, &d
, NULL
));
5607 req
->SetReferrer("http://user:pass@foo.com/");
5609 base::RunLoop().Run();
5611 EXPECT_EQ(std::string("http://foo.com/"), d
.data_received());
5614 TEST_F(URLRequestTestHTTP
, NoFragmentInReferrer
) {
5615 ASSERT_TRUE(test_server_
.Start());
5618 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5619 test_server_
.GetURL("echoheader?Referer"), DEFAULT_PRIORITY
, &d
, NULL
));
5620 req
->SetReferrer("http://foo.com/test#fragment");
5622 base::RunLoop().Run();
5624 EXPECT_EQ(std::string("http://foo.com/test"), d
.data_received());
5627 TEST_F(URLRequestTestHTTP
, EmptyReferrerAfterValidReferrer
) {
5628 ASSERT_TRUE(test_server_
.Start());
5631 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5632 test_server_
.GetURL("echoheader?Referer"), DEFAULT_PRIORITY
, &d
, NULL
));
5633 req
->SetReferrer("http://foo.com/test#fragment");
5634 req
->SetReferrer("");
5636 base::RunLoop().Run();
5638 EXPECT_EQ(std::string("None"), d
.data_received());
5641 // Defer network start and then resume, checking that the request was a success
5642 // and bytes were received.
5643 TEST_F(URLRequestTestHTTP
, DeferredBeforeNetworkStart
) {
5644 ASSERT_TRUE(test_server_
.Start());
5648 d
.set_quit_on_network_start(true);
5649 GURL
test_url(test_server_
.GetURL("echo"));
5650 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5651 test_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5654 base::RunLoop().Run();
5656 EXPECT_EQ(1, d
.received_before_network_start_count());
5657 EXPECT_EQ(0, d
.response_started_count());
5659 req
->ResumeNetworkStart();
5660 base::RunLoop().Run();
5662 EXPECT_EQ(1, d
.response_started_count());
5663 EXPECT_NE(0, d
.bytes_received());
5664 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5668 // Check that OnBeforeNetworkStart is only called once even if there is a
5670 TEST_F(URLRequestTestHTTP
, BeforeNetworkStartCalledOnce
) {
5671 ASSERT_TRUE(test_server_
.Start());
5675 d
.set_quit_on_redirect(true);
5676 d
.set_quit_on_network_start(true);
5677 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5678 test_server_
.GetURL("server-redirect?echo"), DEFAULT_PRIORITY
, &d
,
5682 base::RunLoop().Run();
5684 EXPECT_EQ(1, d
.received_before_network_start_count());
5685 EXPECT_EQ(0, d
.response_started_count());
5686 EXPECT_EQ(0, d
.received_redirect_count());
5688 req
->ResumeNetworkStart();
5689 base::RunLoop().Run();
5691 EXPECT_EQ(1, d
.received_redirect_count());
5692 req
->FollowDeferredRedirect();
5693 base::RunLoop().Run();
5695 // Check that the redirect's new network transaction does not get propagated
5696 // to a second OnBeforeNetworkStart() notification.
5697 EXPECT_EQ(1, d
.received_before_network_start_count());
5699 EXPECT_EQ(1, d
.response_started_count());
5700 EXPECT_NE(0, d
.bytes_received());
5701 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5705 // Cancel the request after learning that the request would use the network.
5706 TEST_F(URLRequestTestHTTP
, CancelOnBeforeNetworkStart
) {
5707 ASSERT_TRUE(test_server_
.Start());
5711 d
.set_quit_on_network_start(true);
5712 GURL
test_url(test_server_
.GetURL("echo"));
5713 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5714 test_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5717 base::RunLoop().Run();
5719 EXPECT_EQ(1, d
.received_before_network_start_count());
5720 EXPECT_EQ(0, d
.response_started_count());
5723 base::RunLoop().Run();
5725 EXPECT_EQ(1, d
.response_started_count());
5726 EXPECT_EQ(0, d
.bytes_received());
5727 EXPECT_EQ(URLRequestStatus::CANCELED
, req
->status().status());
5731 TEST_F(URLRequestTestHTTP
, CancelRedirect
) {
5732 ASSERT_TRUE(test_server_
.Start());
5736 d
.set_cancel_in_received_redirect(true);
5737 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5738 test_server_
.GetURL("files/redirect-test.html"), DEFAULT_PRIORITY
, &d
,
5741 base::RunLoop().Run();
5743 EXPECT_EQ(1, d
.response_started_count());
5744 EXPECT_EQ(0, d
.bytes_received());
5745 EXPECT_FALSE(d
.received_data_before_response());
5746 EXPECT_EQ(URLRequestStatus::CANCELED
, req
->status().status());
5750 TEST_F(URLRequestTestHTTP
, DeferredRedirect
) {
5751 ASSERT_TRUE(test_server_
.Start());
5755 d
.set_quit_on_redirect(true);
5756 GURL
test_url(test_server_
.GetURL("files/redirect-test.html"));
5757 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5758 test_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5761 base::RunLoop().Run();
5763 EXPECT_EQ(1, d
.received_redirect_count());
5765 req
->FollowDeferredRedirect();
5766 base::RunLoop().Run();
5768 EXPECT_EQ(1, d
.response_started_count());
5769 EXPECT_FALSE(d
.received_data_before_response());
5770 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5772 base::FilePath path
;
5773 PathService::Get(base::DIR_SOURCE_ROOT
, &path
);
5774 path
= path
.Append(FILE_PATH_LITERAL("net"));
5775 path
= path
.Append(FILE_PATH_LITERAL("data"));
5776 path
= path
.Append(FILE_PATH_LITERAL("url_request_unittest"));
5777 path
= path
.Append(FILE_PATH_LITERAL("with-headers.html"));
5779 std::string contents
;
5780 EXPECT_TRUE(base::ReadFileToString(path
, &contents
));
5781 EXPECT_EQ(contents
, d
.data_received());
5785 TEST_F(URLRequestTestHTTP
, DeferredRedirect_GetFullRequestHeaders
) {
5786 ASSERT_TRUE(test_server_
.Start());
5790 d
.set_quit_on_redirect(true);
5791 GURL
test_url(test_server_
.GetURL("files/redirect-test.html"));
5792 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5793 test_url
, DEFAULT_PRIORITY
, &d
, NULL
));
5795 EXPECT_FALSE(d
.have_full_request_headers());
5798 base::RunLoop().Run();
5800 EXPECT_EQ(1, d
.received_redirect_count());
5801 EXPECT_TRUE(d
.have_full_request_headers());
5802 CheckFullRequestHeaders(d
.full_request_headers(), test_url
);
5803 d
.ClearFullRequestHeaders();
5805 req
->FollowDeferredRedirect();
5806 base::RunLoop().Run();
5808 GURL
target_url(test_server_
.GetURL("files/with-headers.html"));
5809 EXPECT_EQ(1, d
.response_started_count());
5810 EXPECT_TRUE(d
.have_full_request_headers());
5811 CheckFullRequestHeaders(d
.full_request_headers(), target_url
);
5812 EXPECT_FALSE(d
.received_data_before_response());
5813 EXPECT_EQ(URLRequestStatus::SUCCESS
, req
->status().status());
5815 base::FilePath path
;
5816 PathService::Get(base::DIR_SOURCE_ROOT
, &path
);
5817 path
= path
.Append(FILE_PATH_LITERAL("net"));
5818 path
= path
.Append(FILE_PATH_LITERAL("data"));
5819 path
= path
.Append(FILE_PATH_LITERAL("url_request_unittest"));
5820 path
= path
.Append(FILE_PATH_LITERAL("with-headers.html"));
5822 std::string contents
;
5823 EXPECT_TRUE(base::ReadFileToString(path
, &contents
));
5824 EXPECT_EQ(contents
, d
.data_received());
5828 TEST_F(URLRequestTestHTTP
, CancelDeferredRedirect
) {
5829 ASSERT_TRUE(test_server_
.Start());
5833 d
.set_quit_on_redirect(true);
5834 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5835 test_server_
.GetURL("files/redirect-test.html"), DEFAULT_PRIORITY
, &d
,
5838 base::RunLoop().Run();
5840 EXPECT_EQ(1, d
.received_redirect_count());
5843 base::RunLoop().Run();
5845 EXPECT_EQ(1, d
.response_started_count());
5846 EXPECT_EQ(0, d
.bytes_received());
5847 EXPECT_FALSE(d
.received_data_before_response());
5848 EXPECT_EQ(URLRequestStatus::CANCELED
, req
->status().status());
5852 TEST_F(URLRequestTestHTTP
, VaryHeader
) {
5853 ASSERT_TRUE(test_server_
.Start());
5855 // Populate the cache.
5858 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5859 test_server_
.GetURL("echoheadercache?foo"), DEFAULT_PRIORITY
, &d
,
5861 HttpRequestHeaders headers
;
5862 headers
.SetHeader("foo", "1");
5863 req
->SetExtraRequestHeaders(headers
);
5865 base::RunLoop().Run();
5867 LoadTimingInfo load_timing_info
;
5868 req
->GetLoadTimingInfo(&load_timing_info
);
5869 TestLoadTimingNotReused(load_timing_info
, CONNECT_TIMING_HAS_DNS_TIMES
);
5872 // Expect a cache hit.
5875 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5876 test_server_
.GetURL("echoheadercache?foo"), DEFAULT_PRIORITY
, &d
,
5878 HttpRequestHeaders headers
;
5879 headers
.SetHeader("foo", "1");
5880 req
->SetExtraRequestHeaders(headers
);
5882 base::RunLoop().Run();
5884 EXPECT_TRUE(req
->was_cached());
5886 LoadTimingInfo load_timing_info
;
5887 req
->GetLoadTimingInfo(&load_timing_info
);
5888 TestLoadTimingCacheHitNoNetwork(load_timing_info
);
5891 // Expect a cache miss.
5894 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
5895 test_server_
.GetURL("echoheadercache?foo"), DEFAULT_PRIORITY
, &d
,
5897 HttpRequestHeaders headers
;
5898 headers
.SetHeader("foo", "2");
5899 req
->SetExtraRequestHeaders(headers
);
5901 base::RunLoop().Run();
5903 EXPECT_FALSE(req
->was_cached());
5905 LoadTimingInfo load_timing_info
;
5906 req
->GetLoadTimingInfo(&load_timing_info
);
5907 TestLoadTimingNotReused(load_timing_info
, CONNECT_TIMING_HAS_DNS_TIMES
);
5911 TEST_F(URLRequestTestHTTP
, BasicAuth
) {
5912 ASSERT_TRUE(test_server_
.Start());
5914 // populate the cache
5917 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
5919 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5920 test_server_
.GetURL("auth-basic"), DEFAULT_PRIORITY
, &d
, NULL
));
5923 base::RunLoop().Run();
5925 EXPECT_TRUE(d
.data_received().find("user/secret") != std::string::npos
);
5928 // repeat request with end-to-end validation. since auth-basic results in a
5929 // cachable page, we expect this test to result in a 304. in which case, the
5930 // response should be fetched from the cache.
5933 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
5935 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
5936 test_server_
.GetURL("auth-basic"), DEFAULT_PRIORITY
, &d
, NULL
));
5937 r
->SetLoadFlags(LOAD_VALIDATE_CACHE
);
5940 base::RunLoop().Run();
5942 EXPECT_TRUE(d
.data_received().find("user/secret") != std::string::npos
);
5944 // Should be the same cached document.
5945 EXPECT_TRUE(r
->was_cached());
5949 // Check that Set-Cookie headers in 401 responses are respected.
5950 // http://crbug.com/6450
5951 TEST_F(URLRequestTestHTTP
, BasicAuthWithCookies
) {
5952 ASSERT_TRUE(test_server_
.Start());
5954 GURL url_requiring_auth
=
5955 test_server_
.GetURL("auth-basic?set-cookie-if-challenged");
5957 // Request a page that will give a 401 containing a Set-Cookie header.
5958 // Verify that when the transaction is restarted, it includes the new cookie.
5960 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
5961 TestURLRequestContext
context(true);
5962 context
.set_network_delegate(&network_delegate
);
5966 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
5968 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
5969 url_requiring_auth
, DEFAULT_PRIORITY
, &d
, NULL
));
5972 base::RunLoop().Run();
5974 EXPECT_TRUE(d
.data_received().find("user/secret") != std::string::npos
);
5976 // Make sure we sent the cookie in the restarted transaction.
5977 EXPECT_TRUE(d
.data_received().find("Cookie: got_challenged=true")
5978 != std::string::npos
);
5981 // Same test as above, except this time the restart is initiated earlier
5982 // (without user intervention since identity is embedded in the URL).
5984 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
5985 TestURLRequestContext
context(true);
5986 context
.set_network_delegate(&network_delegate
);
5991 GURL::Replacements replacements
;
5992 replacements
.SetUsernameStr("user2");
5993 replacements
.SetPasswordStr("secret");
5994 GURL url_with_identity
= url_requiring_auth
.ReplaceComponents(replacements
);
5996 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
5997 url_with_identity
, DEFAULT_PRIORITY
, &d
, NULL
));
6000 base::RunLoop().Run();
6002 EXPECT_TRUE(d
.data_received().find("user2/secret") != std::string::npos
);
6004 // Make sure we sent the cookie in the restarted transaction.
6005 EXPECT_TRUE(d
.data_received().find("Cookie: got_challenged=true")
6006 != std::string::npos
);
6010 // Tests that load timing works as expected with auth and the cache.
6011 TEST_F(URLRequestTestHTTP
, BasicAuthLoadTiming
) {
6012 ASSERT_TRUE(test_server_
.Start());
6014 // populate the cache
6017 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
6019 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
6020 test_server_
.GetURL("auth-basic"), DEFAULT_PRIORITY
, &d
, NULL
));
6023 base::RunLoop().Run();
6025 EXPECT_TRUE(d
.data_received().find("user/secret") != std::string::npos
);
6027 LoadTimingInfo load_timing_info_before_auth
;
6028 EXPECT_TRUE(default_network_delegate_
.GetLoadTimingInfoBeforeAuth(
6029 &load_timing_info_before_auth
));
6030 TestLoadTimingNotReused(load_timing_info_before_auth
,
6031 CONNECT_TIMING_HAS_DNS_TIMES
);
6033 LoadTimingInfo load_timing_info
;
6034 r
->GetLoadTimingInfo(&load_timing_info
);
6035 // The test server does not support keep alive sockets, so the second
6036 // request with auth should use a new socket.
6037 TestLoadTimingNotReused(load_timing_info
, CONNECT_TIMING_HAS_DNS_TIMES
);
6038 EXPECT_NE(load_timing_info_before_auth
.socket_log_id
,
6039 load_timing_info
.socket_log_id
);
6040 EXPECT_LE(load_timing_info_before_auth
.receive_headers_end
,
6041 load_timing_info
.connect_timing
.connect_start
);
6044 // Repeat request with end-to-end validation. Since auth-basic results in a
6045 // cachable page, we expect this test to result in a 304. In which case, the
6046 // response should be fetched from the cache.
6049 d
.set_credentials(AuthCredentials(kUser
, kSecret
));
6051 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
6052 test_server_
.GetURL("auth-basic"), DEFAULT_PRIORITY
, &d
, NULL
));
6053 r
->SetLoadFlags(LOAD_VALIDATE_CACHE
);
6056 base::RunLoop().Run();
6058 EXPECT_TRUE(d
.data_received().find("user/secret") != std::string::npos
);
6060 // Should be the same cached document.
6061 EXPECT_TRUE(r
->was_cached());
6063 // Since there was a request that went over the wire, the load timing
6064 // information should include connection times.
6065 LoadTimingInfo load_timing_info
;
6066 r
->GetLoadTimingInfo(&load_timing_info
);
6067 TestLoadTimingNotReused(load_timing_info
, CONNECT_TIMING_HAS_DNS_TIMES
);
6071 // In this test, we do a POST which the server will 302 redirect.
6072 // The subsequent transaction should use GET, and should not send the
6073 // Content-Type header.
6074 // http://code.google.com/p/chromium/issues/detail?id=843
6075 TEST_F(URLRequestTestHTTP
, Post302RedirectGet
) {
6076 ASSERT_TRUE(test_server_
.Start());
6078 const char kData
[] = "hello world";
6081 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6082 test_server_
.GetURL("files/redirect-to-echoall"), DEFAULT_PRIORITY
, &d
,
6084 req
->set_method("POST");
6085 req
->set_upload(CreateSimpleUploadData(kData
));
6087 // Set headers (some of which are specific to the POST).
6088 HttpRequestHeaders headers
;
6089 headers
.AddHeadersFromString(
6090 "Content-Type: multipart/form-data; "
6091 "boundary=----WebKitFormBoundaryAADeAA+NAAWMAAwZ\r\n"
6092 "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,"
6093 "text/plain;q=0.8,image/png,*/*;q=0.5\r\n"
6094 "Accept-Language: en-US,en\r\n"
6095 "Accept-Charset: ISO-8859-1,*,utf-8\r\n"
6096 "Content-Length: 11\r\n"
6097 "Origin: http://localhost:1337/");
6098 req
->SetExtraRequestHeaders(headers
);
6100 base::RunLoop().Run();
6102 std::string mime_type
;
6103 req
->GetMimeType(&mime_type
);
6104 EXPECT_EQ("text/html", mime_type
);
6106 const std::string
& data
= d
.data_received();
6108 // Check that the post-specific headers were stripped:
6109 EXPECT_FALSE(ContainsString(data
, "Content-Length:"));
6110 EXPECT_FALSE(ContainsString(data
, "Content-Type:"));
6111 EXPECT_FALSE(ContainsString(data
, "Origin:"));
6113 // These extra request headers should not have been stripped.
6114 EXPECT_TRUE(ContainsString(data
, "Accept:"));
6115 EXPECT_TRUE(ContainsString(data
, "Accept-Language:"));
6116 EXPECT_TRUE(ContainsString(data
, "Accept-Charset:"));
6119 // The following tests check that we handle mutating the request method for
6120 // HTTP redirects as expected.
6121 // See http://crbug.com/56373 and http://crbug.com/102130.
6123 TEST_F(URLRequestTestHTTP
, Redirect301Tests
) {
6124 ASSERT_TRUE(test_server_
.Start());
6126 const GURL url
= test_server_
.GetURL("files/redirect301-to-echo");
6128 HTTPRedirectMethodTest(url
, "POST", "GET", true);
6129 HTTPRedirectMethodTest(url
, "PUT", "PUT", true);
6130 HTTPRedirectMethodTest(url
, "HEAD", "HEAD", false);
6133 TEST_F(URLRequestTestHTTP
, Redirect302Tests
) {
6134 ASSERT_TRUE(test_server_
.Start());
6136 const GURL url
= test_server_
.GetURL("files/redirect302-to-echo");
6138 HTTPRedirectMethodTest(url
, "POST", "GET", true);
6139 HTTPRedirectMethodTest(url
, "PUT", "PUT", true);
6140 HTTPRedirectMethodTest(url
, "HEAD", "HEAD", false);
6143 TEST_F(URLRequestTestHTTP
, Redirect303Tests
) {
6144 ASSERT_TRUE(test_server_
.Start());
6146 const GURL url
= test_server_
.GetURL("files/redirect303-to-echo");
6148 HTTPRedirectMethodTest(url
, "POST", "GET", true);
6149 HTTPRedirectMethodTest(url
, "PUT", "GET", true);
6150 HTTPRedirectMethodTest(url
, "HEAD", "HEAD", false);
6153 TEST_F(URLRequestTestHTTP
, Redirect307Tests
) {
6154 ASSERT_TRUE(test_server_
.Start());
6156 const GURL url
= test_server_
.GetURL("files/redirect307-to-echo");
6158 HTTPRedirectMethodTest(url
, "POST", "POST", true);
6159 HTTPRedirectMethodTest(url
, "PUT", "PUT", true);
6160 HTTPRedirectMethodTest(url
, "HEAD", "HEAD", false);
6163 TEST_F(URLRequestTestHTTP
, Redirect308Tests
) {
6164 ASSERT_TRUE(test_server_
.Start());
6166 const GURL url
= test_server_
.GetURL("files/redirect308-to-echo");
6168 HTTPRedirectMethodTest(url
, "POST", "POST", true);
6169 HTTPRedirectMethodTest(url
, "PUT", "PUT", true);
6170 HTTPRedirectMethodTest(url
, "HEAD", "HEAD", false);
6173 // Make sure that 308 responses without bodies are not treated as redirects.
6174 // Certain legacy apis that pre-date the response code expect this behavior
6175 // (Like Google Drive).
6176 TEST_F(URLRequestTestHTTP
, NoRedirectOn308WithoutLocationHeader
) {
6177 ASSERT_TRUE(test_server_
.Start());
6180 const GURL url
= test_server_
.GetURL("files/308-without-location-header");
6182 scoped_ptr
<URLRequest
> request(default_context_
.CreateRequest(
6183 url
, DEFAULT_PRIORITY
, &d
, NULL
));
6186 base::RunLoop().Run();
6187 EXPECT_EQ(URLRequestStatus::SUCCESS
, request
->status().status());
6188 EXPECT_EQ(OK
, request
->status().error());
6189 EXPECT_EQ(0, d
.received_redirect_count());
6190 EXPECT_EQ(308, request
->response_headers()->response_code());
6191 EXPECT_EQ("This is not a redirect.", d
.data_received());
6194 TEST_F(URLRequestTestHTTP
, Redirect302PreserveReferenceFragment
) {
6195 ASSERT_TRUE(test_server_
.Start());
6197 GURL
original_url(test_server_
.GetURL("files/redirect302-to-echo#fragment"));
6198 GURL
expected_url(test_server_
.GetURL("echo#fragment"));
6202 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
6203 original_url
, DEFAULT_PRIORITY
, &d
, NULL
));
6206 base::RunLoop().Run();
6208 EXPECT_EQ(2U, r
->url_chain().size());
6209 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
6210 EXPECT_EQ(OK
, r
->status().error());
6211 EXPECT_EQ(original_url
, r
->original_url());
6212 EXPECT_EQ(expected_url
, r
->url());
6216 TEST_F(URLRequestTestHTTP
, RedirectPreserveFirstPartyURL
) {
6217 ASSERT_TRUE(test_server_
.Start());
6219 GURL
url(test_server_
.GetURL("files/redirect302-to-echo"));
6220 GURL
first_party_url("http://example.com");
6224 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
6225 url
, DEFAULT_PRIORITY
, &d
, NULL
));
6226 r
->set_first_party_for_cookies(first_party_url
);
6229 base::RunLoop().Run();
6231 EXPECT_EQ(2U, r
->url_chain().size());
6232 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
6233 EXPECT_EQ(OK
, r
->status().error());
6234 EXPECT_EQ(first_party_url
, r
->first_party_for_cookies());
6238 TEST_F(URLRequestTestHTTP
, RedirectUpdateFirstPartyURL
) {
6239 ASSERT_TRUE(test_server_
.Start());
6241 GURL
url(test_server_
.GetURL("files/redirect302-to-echo"));
6242 GURL
original_first_party_url("http://example.com");
6243 GURL
expected_first_party_url(test_server_
.GetURL("echo"));
6247 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
6248 url
, DEFAULT_PRIORITY
, &d
, NULL
));
6249 r
->set_first_party_for_cookies(original_first_party_url
);
6250 r
->set_first_party_url_policy(
6251 URLRequest::UPDATE_FIRST_PARTY_URL_ON_REDIRECT
);
6254 base::RunLoop().Run();
6256 EXPECT_EQ(2U, r
->url_chain().size());
6257 EXPECT_EQ(URLRequestStatus::SUCCESS
, r
->status().status());
6258 EXPECT_EQ(OK
, r
->status().error());
6259 EXPECT_EQ(expected_first_party_url
, r
->first_party_for_cookies());
6263 TEST_F(URLRequestTestHTTP
, InterceptPost302RedirectGet
) {
6264 ASSERT_TRUE(test_server_
.Start());
6266 const char kData
[] = "hello world";
6269 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6270 test_server_
.GetURL("empty.html"), DEFAULT_PRIORITY
, &d
, NULL
));
6271 req
->set_method("POST");
6272 req
->set_upload(CreateSimpleUploadData(kData
));
6273 HttpRequestHeaders headers
;
6274 headers
.SetHeader(HttpRequestHeaders::kContentLength
,
6275 base::UintToString(arraysize(kData
) - 1));
6276 req
->SetExtraRequestHeaders(headers
);
6278 URLRequestRedirectJob
* job
= new URLRequestRedirectJob(
6279 req
.get(), &default_network_delegate_
, test_server_
.GetURL("echo"),
6280 URLRequestRedirectJob::REDIRECT_302_FOUND
, "Very Good Reason");
6281 AddTestInterceptor()->set_main_intercept_job(job
);
6284 base::RunLoop().Run();
6285 EXPECT_EQ("GET", req
->method());
6288 TEST_F(URLRequestTestHTTP
, InterceptPost307RedirectPost
) {
6289 ASSERT_TRUE(test_server_
.Start());
6291 const char kData
[] = "hello world";
6294 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6295 test_server_
.GetURL("empty.html"), DEFAULT_PRIORITY
, &d
, NULL
));
6296 req
->set_method("POST");
6297 req
->set_upload(CreateSimpleUploadData(kData
));
6298 HttpRequestHeaders headers
;
6299 headers
.SetHeader(HttpRequestHeaders::kContentLength
,
6300 base::UintToString(arraysize(kData
) - 1));
6301 req
->SetExtraRequestHeaders(headers
);
6303 URLRequestRedirectJob
* job
= new URLRequestRedirectJob(
6304 req
.get(), &default_network_delegate_
, test_server_
.GetURL("echo"),
6305 URLRequestRedirectJob::REDIRECT_307_TEMPORARY_REDIRECT
,
6306 "Very Good Reason");
6307 AddTestInterceptor()->set_main_intercept_job(job
);
6310 base::RunLoop().Run();
6311 EXPECT_EQ("POST", req
->method());
6312 EXPECT_EQ(kData
, d
.data_received());
6315 // Check that default A-L header is sent.
6316 TEST_F(URLRequestTestHTTP
, DefaultAcceptLanguage
) {
6317 ASSERT_TRUE(test_server_
.Start());
6319 StaticHttpUserAgentSettings
settings("en", std::string());
6320 TestNetworkDelegate network_delegate
; // Must outlive URLRequests.
6321 TestURLRequestContext
context(true);
6322 context
.set_network_delegate(&network_delegate
);
6323 context
.set_http_user_agent_settings(&settings
);
6327 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
6328 test_server_
.GetURL("echoheader?Accept-Language"), DEFAULT_PRIORITY
, &d
,
6331 base::RunLoop().Run();
6332 EXPECT_EQ("en", d
.data_received());
6335 // Check that an empty A-L header is not sent. http://crbug.com/77365.
6336 TEST_F(URLRequestTestHTTP
, EmptyAcceptLanguage
) {
6337 ASSERT_TRUE(test_server_
.Start());
6339 std::string empty_string
; // Avoid most vexing parse on line below.
6340 StaticHttpUserAgentSettings
settings(empty_string
, empty_string
);
6341 TestNetworkDelegate network_delegate
; // Must outlive URLRequests.
6342 TestURLRequestContext
context(true);
6343 context
.set_network_delegate(&network_delegate
);
6345 // We override the language after initialization because empty entries
6346 // get overridden by Init().
6347 context
.set_http_user_agent_settings(&settings
);
6350 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
6351 test_server_
.GetURL("echoheader?Accept-Language"), DEFAULT_PRIORITY
, &d
,
6354 base::RunLoop().Run();
6355 EXPECT_EQ("None", d
.data_received());
6358 // Check that if request overrides the A-L header, the default is not appended.
6359 // See http://crbug.com/20894
6360 TEST_F(URLRequestTestHTTP
, OverrideAcceptLanguage
) {
6361 ASSERT_TRUE(test_server_
.Start());
6364 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6365 test_server_
.GetURL("echoheader?Accept-Language"), DEFAULT_PRIORITY
, &d
,
6367 HttpRequestHeaders headers
;
6368 headers
.SetHeader(HttpRequestHeaders::kAcceptLanguage
, "ru");
6369 req
->SetExtraRequestHeaders(headers
);
6371 base::RunLoop().Run();
6372 EXPECT_EQ(std::string("ru"), d
.data_received());
6375 // Check that default A-E header is sent.
6376 TEST_F(URLRequestTestHTTP
, DefaultAcceptEncoding
) {
6377 ASSERT_TRUE(test_server_
.Start());
6380 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6381 test_server_
.GetURL("echoheader?Accept-Encoding"), DEFAULT_PRIORITY
, &d
,
6383 HttpRequestHeaders headers
;
6384 req
->SetExtraRequestHeaders(headers
);
6386 base::RunLoop().Run();
6387 EXPECT_TRUE(ContainsString(d
.data_received(), "gzip"));
6390 // Check that if request overrides the A-E header, the default is not appended.
6391 // See http://crbug.com/47381
6392 TEST_F(URLRequestTestHTTP
, OverrideAcceptEncoding
) {
6393 ASSERT_TRUE(test_server_
.Start());
6396 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6397 test_server_
.GetURL("echoheader?Accept-Encoding"), DEFAULT_PRIORITY
, &d
,
6399 HttpRequestHeaders headers
;
6400 headers
.SetHeader(HttpRequestHeaders::kAcceptEncoding
, "identity");
6401 req
->SetExtraRequestHeaders(headers
);
6403 base::RunLoop().Run();
6404 EXPECT_FALSE(ContainsString(d
.data_received(), "gzip"));
6405 EXPECT_TRUE(ContainsString(d
.data_received(), "identity"));
6408 // Check that setting the A-C header sends the proper header.
6409 TEST_F(URLRequestTestHTTP
, SetAcceptCharset
) {
6410 ASSERT_TRUE(test_server_
.Start());
6413 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6414 test_server_
.GetURL("echoheader?Accept-Charset"), DEFAULT_PRIORITY
, &d
,
6416 HttpRequestHeaders headers
;
6417 headers
.SetHeader(HttpRequestHeaders::kAcceptCharset
, "koi-8r");
6418 req
->SetExtraRequestHeaders(headers
);
6420 base::RunLoop().Run();
6421 EXPECT_EQ(std::string("koi-8r"), d
.data_received());
6424 // Check that default User-Agent header is sent.
6425 TEST_F(URLRequestTestHTTP
, DefaultUserAgent
) {
6426 ASSERT_TRUE(test_server_
.Start());
6429 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6430 test_server_
.GetURL("echoheader?User-Agent"), DEFAULT_PRIORITY
, &d
,
6433 base::RunLoop().Run();
6434 EXPECT_EQ(default_context_
.http_user_agent_settings()->GetUserAgent(),
6438 // Check that if request overrides the User-Agent header,
6439 // the default is not appended.
6440 TEST_F(URLRequestTestHTTP
, OverrideUserAgent
) {
6441 ASSERT_TRUE(test_server_
.Start());
6444 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6445 test_server_
.GetURL("echoheader?User-Agent"), DEFAULT_PRIORITY
, &d
,
6447 HttpRequestHeaders headers
;
6448 headers
.SetHeader(HttpRequestHeaders::kUserAgent
, "Lynx (textmode)");
6449 req
->SetExtraRequestHeaders(headers
);
6451 base::RunLoop().Run();
6452 EXPECT_EQ(std::string("Lynx (textmode)"), d
.data_received());
6455 // Check that a NULL HttpUserAgentSettings causes the corresponding empty
6456 // User-Agent header to be sent but does not send the Accept-Language and
6457 // Accept-Charset headers.
6458 TEST_F(URLRequestTestHTTP
, EmptyHttpUserAgentSettings
) {
6459 ASSERT_TRUE(test_server_
.Start());
6461 TestNetworkDelegate network_delegate
; // Must outlive URLRequests.
6462 TestURLRequestContext
context(true);
6463 context
.set_network_delegate(&network_delegate
);
6465 // We override the HttpUserAgentSettings after initialization because empty
6466 // entries get overridden by Init().
6467 context
.set_http_user_agent_settings(NULL
);
6470 const char* request
;
6471 const char* expected_response
;
6472 } tests
[] = { { "echoheader?Accept-Language", "None" },
6473 { "echoheader?Accept-Charset", "None" },
6474 { "echoheader?User-Agent", "" } };
6476 for (size_t i
= 0; i
< arraysize(tests
); i
++) {
6478 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
6479 test_server_
.GetURL(tests
[i
].request
), DEFAULT_PRIORITY
, &d
, NULL
));
6481 base::RunLoop().Run();
6482 EXPECT_EQ(tests
[i
].expected_response
, d
.data_received())
6483 << " Request = \"" << tests
[i
].request
<< "\"";
6487 // Make sure that URLRequest passes on its priority updates to
6488 // newly-created jobs after the first one.
6489 TEST_F(URLRequestTestHTTP
, SetSubsequentJobPriority
) {
6490 ASSERT_TRUE(test_server_
.Start());
6493 scoped_ptr
<URLRequest
> req(default_context_
.CreateRequest(
6494 test_server_
.GetURL("empty.html"), DEFAULT_PRIORITY
, &d
, NULL
));
6495 EXPECT_EQ(DEFAULT_PRIORITY
, req
->priority());
6497 scoped_refptr
<URLRequestRedirectJob
> redirect_job
=
6498 new URLRequestRedirectJob(
6499 req
.get(), &default_network_delegate_
, test_server_
.GetURL("echo"),
6500 URLRequestRedirectJob::REDIRECT_302_FOUND
, "Very Good Reason");
6501 AddTestInterceptor()->set_main_intercept_job(redirect_job
.get());
6503 req
->SetPriority(LOW
);
6505 EXPECT_TRUE(req
->is_pending());
6507 scoped_refptr
<URLRequestTestJob
> job
=
6508 new URLRequestTestJob(req
.get(), &default_network_delegate_
);
6509 AddTestInterceptor()->set_main_intercept_job(job
.get());
6511 // Should trigger |job| to be started.
6512 base::RunLoop().Run();
6513 EXPECT_EQ(LOW
, job
->priority());
6516 // Check that creating a network request while entering/exiting suspend mode
6517 // fails as it should. This is the only case where an HttpTransactionFactory
6518 // does not return an HttpTransaction.
6519 TEST_F(URLRequestTestHTTP
, NetworkSuspendTest
) {
6520 // Create a new HttpNetworkLayer that thinks it's suspended.
6521 HttpNetworkSession::Params params
;
6522 params
.host_resolver
= default_context_
.host_resolver();
6523 params
.cert_verifier
= default_context_
.cert_verifier();
6524 params
.transport_security_state
= default_context_
.transport_security_state();
6525 params
.proxy_service
= default_context_
.proxy_service();
6526 params
.ssl_config_service
= default_context_
.ssl_config_service();
6527 params
.http_auth_handler_factory
=
6528 default_context_
.http_auth_handler_factory();
6529 params
.network_delegate
= &default_network_delegate_
;
6530 params
.http_server_properties
= default_context_
.http_server_properties();
6531 scoped_ptr
<HttpNetworkLayer
> network_layer(
6532 new HttpNetworkLayer(new HttpNetworkSession(params
)));
6533 network_layer
->OnSuspend();
6535 HttpCache
http_cache(network_layer
.release(), default_context_
.net_log(),
6536 HttpCache::DefaultBackend::InMemory(0));
6538 TestURLRequestContext
context(true);
6539 context
.set_http_transaction_factory(&http_cache
);
6543 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
6544 GURL("http://127.0.0.1/"), DEFAULT_PRIORITY
, &d
, NULL
));
6546 base::RunLoop().Run();
6548 EXPECT_TRUE(d
.request_failed());
6549 EXPECT_EQ(URLRequestStatus::FAILED
, req
->status().status());
6550 EXPECT_EQ(ERR_NETWORK_IO_SUSPENDED
, req
->status().error());
6553 // Check that creating a network request while entering/exiting suspend mode
6554 // fails as it should in the case there is no cache. This is the only case
6555 // where an HttpTransactionFactory does not return an HttpTransaction.
6556 TEST_F(URLRequestTestHTTP
, NetworkSuspendTestNoCache
) {
6557 // Create a new HttpNetworkLayer that thinks it's suspended.
6558 HttpNetworkSession::Params params
;
6559 params
.host_resolver
= default_context_
.host_resolver();
6560 params
.cert_verifier
= default_context_
.cert_verifier();
6561 params
.transport_security_state
= default_context_
.transport_security_state();
6562 params
.proxy_service
= default_context_
.proxy_service();
6563 params
.ssl_config_service
= default_context_
.ssl_config_service();
6564 params
.http_auth_handler_factory
=
6565 default_context_
.http_auth_handler_factory();
6566 params
.network_delegate
= &default_network_delegate_
;
6567 params
.http_server_properties
= default_context_
.http_server_properties();
6568 HttpNetworkLayer
network_layer(new HttpNetworkSession(params
));
6569 network_layer
.OnSuspend();
6571 TestURLRequestContext
context(true);
6572 context
.set_http_transaction_factory(&network_layer
);
6576 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
6577 GURL("http://127.0.0.1/"), DEFAULT_PRIORITY
, &d
, NULL
));
6579 base::RunLoop().Run();
6581 EXPECT_TRUE(d
.request_failed());
6582 EXPECT_EQ(URLRequestStatus::FAILED
, req
->status().status());
6583 EXPECT_EQ(ERR_NETWORK_IO_SUSPENDED
, req
->status().error());
6586 class URLRequestInterceptorTestHTTP
: public URLRequestTestHTTP
{
6588 // TODO(bengr): Merge this with the URLRequestInterceptorHTTPTest fixture,
6589 // ideally remove the dependency on URLRequestTestJob, and maybe move these
6590 // tests into the factory tests.
6591 URLRequestInterceptorTestHTTP() : URLRequestTestHTTP(), interceptor_(NULL
) {
6594 void SetUpFactory() override
{
6595 interceptor_
= new MockURLRequestInterceptor();
6596 job_factory_
.reset(new URLRequestInterceptingJobFactory(
6597 job_factory_
.Pass(), make_scoped_ptr(interceptor_
)));
6600 MockURLRequestInterceptor
* interceptor() const {
6601 return interceptor_
;
6605 MockURLRequestInterceptor
* interceptor_
;
6608 TEST_F(URLRequestInterceptorTestHTTP
,
6609 NetworkDelegateNotificationOnRedirectIntercept
) {
6610 interceptor()->set_intercept_redirect(true);
6611 interceptor()->set_redirect_headers(MockURLRequestInterceptor::ok_headers());
6612 interceptor()->set_redirect_data(MockURLRequestInterceptor::ok_data());
6614 ASSERT_TRUE(test_server()->Start());
6617 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
6618 test_server()->GetURL("files/redirect-test.html"), DEFAULT_PRIORITY
,
6621 base::RunLoop().Run();
6623 EXPECT_TRUE(interceptor()->did_intercept_redirect());
6624 // Check we got one good response
6625 EXPECT_TRUE(req
->status().is_success());
6626 if (req
->status().is_success())
6627 EXPECT_EQ(200, req
->response_headers()->response_code());
6629 EXPECT_EQ(MockURLRequestInterceptor::ok_data(), d
.data_received());
6630 EXPECT_EQ(1, d
.response_started_count());
6631 EXPECT_EQ(0, d
.received_redirect_count());
6633 EXPECT_EQ(1, default_network_delegate()->created_requests());
6634 EXPECT_EQ(1, default_network_delegate()->before_send_headers_count());
6635 EXPECT_EQ(1, default_network_delegate()->headers_received_count());
6638 TEST_F(URLRequestInterceptorTestHTTP
,
6639 NetworkDelegateNotificationOnErrorIntercept
) {
6640 // Intercept that error and respond with an OK response.
6641 interceptor()->set_intercept_final_response(true);
6642 interceptor()->set_final_headers(MockURLRequestInterceptor::ok_headers());
6643 interceptor()->set_final_data(MockURLRequestInterceptor::ok_data());
6644 default_network_delegate()->set_can_be_intercepted_on_error(true);
6646 ASSERT_TRUE(test_server()->Start());
6649 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
6650 test_server()->GetURL("files/two-content-lengths.html"), DEFAULT_PRIORITY
,
6652 req
->set_method("GET");
6654 base::RunLoop().Run();
6656 EXPECT_TRUE(interceptor()->did_intercept_final());
6658 // Check we received one good response.
6659 EXPECT_TRUE(req
->status().is_success());
6660 if (req
->status().is_success())
6661 EXPECT_EQ(200, req
->response_headers()->response_code());
6662 EXPECT_EQ(MockURLRequestInterceptor::ok_data(), d
.data_received());
6663 EXPECT_EQ(1, d
.response_started_count());
6664 EXPECT_EQ(0, d
.received_redirect_count());
6666 EXPECT_EQ(1, default_network_delegate()->created_requests());
6667 EXPECT_EQ(1, default_network_delegate()->before_send_headers_count());
6668 EXPECT_EQ(0, default_network_delegate()->headers_received_count());
6671 TEST_F(URLRequestInterceptorTestHTTP
,
6672 NetworkDelegateNotificationOnResponseIntercept
) {
6673 // Intercept that error and respond with an OK response.
6674 interceptor()->set_intercept_final_response(true);
6676 // Intercept with a real URLRequestHttpJob.
6677 interceptor()->set_use_url_request_http_job(true);
6679 ASSERT_TRUE(test_server()->Start());
6682 scoped_ptr
<URLRequest
> req(default_context().CreateRequest(
6683 test_server()->GetURL("files/simple.html"), DEFAULT_PRIORITY
,
6685 req
->set_method("GET");
6687 base::RunLoop().Run();
6689 EXPECT_TRUE(interceptor()->did_intercept_final());
6691 // Check we received one good response.
6692 EXPECT_TRUE(req
->status().is_success());
6693 if (req
->status().is_success())
6694 EXPECT_EQ(200, req
->response_headers()->response_code());
6695 EXPECT_EQ("hello", d
.data_received());
6696 EXPECT_EQ(1, d
.response_started_count());
6697 EXPECT_EQ(0, d
.received_redirect_count());
6699 EXPECT_EQ(1, default_network_delegate()->created_requests());
6700 EXPECT_EQ(2, default_network_delegate()->before_send_headers_count());
6701 EXPECT_EQ(2, default_network_delegate()->headers_received_count());
6704 class URLRequestTestReferrerPolicy
: public URLRequestTest
{
6706 URLRequestTestReferrerPolicy() {}
6708 void InstantiateSameOriginServers(SpawnedTestServer::Type origin_type
) {
6709 origin_server_
.reset(new SpawnedTestServer(
6710 origin_type
, SpawnedTestServer::kLocalhost
,
6711 origin_type
== SpawnedTestServer::TYPE_HTTPS
6712 ? base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))
6714 FILE_PATH_LITERAL("net/data/url_request_unittest"))));
6715 ASSERT_TRUE(origin_server_
->Start());
6718 void InstantiateCrossOriginServers(SpawnedTestServer::Type origin_type
,
6719 SpawnedTestServer::Type destination_type
) {
6720 origin_server_
.reset(new SpawnedTestServer(
6721 origin_type
, SpawnedTestServer::kLocalhost
,
6722 origin_type
== SpawnedTestServer::TYPE_HTTPS
6723 ? base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))
6725 FILE_PATH_LITERAL("net/data/url_request_unittest"))));
6726 ASSERT_TRUE(origin_server_
->Start());
6728 destination_server_
.reset(new SpawnedTestServer(
6729 destination_type
, SpawnedTestServer::kLocalhost
,
6730 destination_type
== SpawnedTestServer::TYPE_HTTPS
6731 ? base::FilePath(FILE_PATH_LITERAL("net/data/ssl"))
6733 FILE_PATH_LITERAL("net/data/url_request_unittest"))));
6734 ASSERT_TRUE(destination_server_
->Start());
6737 void VerifyReferrerAfterRedirect(URLRequest::ReferrerPolicy policy
,
6738 const GURL
& referrer
,
6739 const GURL
& expected
) {
6740 // Create and execute the request: we'll only have a |destination_server_|
6741 // if the origins are meant to be distinct. Otherwise, we'll use the
6742 // |origin_server_| for both endpoints.
6743 GURL destination_url
=
6744 destination_server_
? destination_server_
->GetURL("echoheader?Referer")
6745 : origin_server_
->GetURL("echoheader?Referer");
6747 origin_server_
->GetURL("server-redirect?" + destination_url
.spec());
6750 scoped_ptr
<URLRequest
> req(
6751 default_context_
.CreateRequest(origin_url
, DEFAULT_PRIORITY
, &d
, NULL
));
6752 req
->set_referrer_policy(policy
);
6753 req
->SetReferrer(referrer
.spec());
6755 base::RunLoop().Run();
6757 EXPECT_EQ(1, d
.response_started_count());
6758 EXPECT_EQ(1, d
.received_redirect_count());
6759 EXPECT_EQ(destination_url
, req
->url());
6760 EXPECT_TRUE(req
->status().is_success());
6761 EXPECT_EQ(200, req
->response_headers()->response_code());
6763 EXPECT_EQ(expected
.spec(), req
->referrer());
6764 if (expected
.is_empty())
6765 EXPECT_EQ("None", d
.data_received());
6767 EXPECT_EQ(expected
.spec(), d
.data_received());
6770 SpawnedTestServer
* origin_server() const { return origin_server_
.get(); }
6773 scoped_ptr
<SpawnedTestServer
> origin_server_
;
6774 scoped_ptr
<SpawnedTestServer
> destination_server_
;
6777 TEST_F(URLRequestTestReferrerPolicy
, HTTPToSameOriginHTTP
) {
6778 InstantiateSameOriginServers(SpawnedTestServer::TYPE_HTTP
);
6780 VerifyReferrerAfterRedirect(
6781 URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE
,
6782 origin_server()->GetURL("path/to/file.html"),
6783 origin_server()->GetURL("path/to/file.html"));
6785 VerifyReferrerAfterRedirect(
6786 URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN
,
6787 origin_server()->GetURL("path/to/file.html"),
6788 origin_server()->GetURL("path/to/file.html"));
6790 VerifyReferrerAfterRedirect(
6791 URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN
,
6792 origin_server()->GetURL("path/to/file.html"),
6793 origin_server()->GetURL("path/to/file.html"));
6795 VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER
,
6796 origin_server()->GetURL("path/to/file.html"),
6797 origin_server()->GetURL("path/to/file.html"));
6800 TEST_F(URLRequestTestReferrerPolicy
, HTTPToCrossOriginHTTP
) {
6801 InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTP
,
6802 SpawnedTestServer::TYPE_HTTP
);
6804 VerifyReferrerAfterRedirect(
6805 URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE
,
6806 origin_server()->GetURL("path/to/file.html"),
6807 origin_server()->GetURL("path/to/file.html"));
6809 VerifyReferrerAfterRedirect(
6810 URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN
,
6811 origin_server()->GetURL("path/to/file.html"),
6812 origin_server()->GetURL(std::string()));
6814 VerifyReferrerAfterRedirect(
6815 URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN
,
6816 origin_server()->GetURL("path/to/file.html"),
6817 origin_server()->GetURL(std::string()));
6819 VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER
,
6820 origin_server()->GetURL("path/to/file.html"),
6821 origin_server()->GetURL("path/to/file.html"));
6824 TEST_F(URLRequestTestReferrerPolicy
, HTTPSToSameOriginHTTPS
) {
6825 InstantiateSameOriginServers(SpawnedTestServer::TYPE_HTTPS
);
6827 VerifyReferrerAfterRedirect(
6828 URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE
,
6829 origin_server()->GetURL("path/to/file.html"),
6830 origin_server()->GetURL("path/to/file.html"));
6832 VerifyReferrerAfterRedirect(
6833 URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN
,
6834 origin_server()->GetURL("path/to/file.html"),
6835 origin_server()->GetURL("path/to/file.html"));
6837 VerifyReferrerAfterRedirect(
6838 URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN
,
6839 origin_server()->GetURL("path/to/file.html"),
6840 origin_server()->GetURL("path/to/file.html"));
6842 VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER
,
6843 origin_server()->GetURL("path/to/file.html"),
6844 origin_server()->GetURL("path/to/file.html"));
6847 TEST_F(URLRequestTestReferrerPolicy
, HTTPSToCrossOriginHTTPS
) {
6848 InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTPS
,
6849 SpawnedTestServer::TYPE_HTTPS
);
6851 VerifyReferrerAfterRedirect(
6852 URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE
,
6853 origin_server()->GetURL("path/to/file.html"),
6854 origin_server()->GetURL("path/to/file.html"));
6856 VerifyReferrerAfterRedirect(
6857 URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN
,
6858 origin_server()->GetURL("path/to/file.html"),
6859 origin_server()->GetURL(std::string()));
6861 VerifyReferrerAfterRedirect(
6862 URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN
,
6863 origin_server()->GetURL("path/to/file.html"),
6864 origin_server()->GetURL(std::string()));
6866 VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER
,
6867 origin_server()->GetURL("path/to/file.html"),
6868 origin_server()->GetURL("path/to/file.html"));
6871 TEST_F(URLRequestTestReferrerPolicy
, HTTPToHTTPS
) {
6872 InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTP
,
6873 SpawnedTestServer::TYPE_HTTPS
);
6875 VerifyReferrerAfterRedirect(
6876 URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE
,
6877 origin_server()->GetURL("path/to/file.html"),
6878 origin_server()->GetURL("path/to/file.html"));
6880 VerifyReferrerAfterRedirect(
6881 URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN
,
6882 origin_server()->GetURL("path/to/file.html"),
6883 origin_server()->GetURL(std::string()));
6885 VerifyReferrerAfterRedirect(
6886 URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN
,
6887 origin_server()->GetURL("path/to/file.html"),
6888 origin_server()->GetURL(std::string()));
6890 VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER
,
6891 origin_server()->GetURL("path/to/file.html"),
6892 origin_server()->GetURL("path/to/file.html"));
6895 TEST_F(URLRequestTestReferrerPolicy
, HTTPSToHTTP
) {
6896 InstantiateCrossOriginServers(SpawnedTestServer::TYPE_HTTPS
,
6897 SpawnedTestServer::TYPE_HTTP
);
6899 VerifyReferrerAfterRedirect(
6900 URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE
,
6901 origin_server()->GetURL("path/to/file.html"), GURL());
6903 VerifyReferrerAfterRedirect(
6904 URLRequest::REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN
,
6905 origin_server()->GetURL("path/to/file.html"), GURL());
6907 VerifyReferrerAfterRedirect(
6908 URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN
,
6909 origin_server()->GetURL("path/to/file.html"),
6910 origin_server()->GetURL(std::string()));
6912 VerifyReferrerAfterRedirect(URLRequest::NEVER_CLEAR_REFERRER
,
6913 origin_server()->GetURL("path/to/file.html"),
6914 origin_server()->GetURL("path/to/file.html"));
6917 class HTTPSRequestTest
: public testing::Test
{
6919 HTTPSRequestTest() : default_context_(true) {
6920 default_context_
.set_network_delegate(&default_network_delegate_
);
6921 default_context_
.Init();
6923 ~HTTPSRequestTest() override
{}
6926 TestNetworkDelegate default_network_delegate_
; // Must outlive URLRequest.
6927 TestURLRequestContext default_context_
;
6930 TEST_F(HTTPSRequestTest
, HTTPSGetTest
) {
6931 SpawnedTestServer
test_server(
6932 SpawnedTestServer::TYPE_HTTPS
,
6933 SpawnedTestServer::kLocalhost
,
6934 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
6935 ASSERT_TRUE(test_server
.Start());
6939 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
6940 test_server
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
6942 EXPECT_TRUE(r
->is_pending());
6944 base::RunLoop().Run();
6946 EXPECT_EQ(1, d
.response_started_count());
6947 EXPECT_FALSE(d
.received_data_before_response());
6948 EXPECT_NE(0, d
.bytes_received());
6949 CheckSSLInfo(r
->ssl_info());
6950 EXPECT_EQ(test_server
.host_port_pair().host(),
6951 r
->GetSocketAddress().host());
6952 EXPECT_EQ(test_server
.host_port_pair().port(),
6953 r
->GetSocketAddress().port());
6957 TEST_F(HTTPSRequestTest
, HTTPSMismatchedTest
) {
6958 SpawnedTestServer::SSLOptions
ssl_options(
6959 SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME
);
6960 SpawnedTestServer
test_server(
6961 SpawnedTestServer::TYPE_HTTPS
,
6963 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
6964 ASSERT_TRUE(test_server
.Start());
6966 bool err_allowed
= true;
6967 for (int i
= 0; i
< 2 ; i
++, err_allowed
= !err_allowed
) {
6970 d
.set_allow_certificate_errors(err_allowed
);
6971 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
6972 test_server
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
6975 EXPECT_TRUE(r
->is_pending());
6977 base::RunLoop().Run();
6979 EXPECT_EQ(1, d
.response_started_count());
6980 EXPECT_FALSE(d
.received_data_before_response());
6981 EXPECT_TRUE(d
.have_certificate_errors());
6983 EXPECT_NE(0, d
.bytes_received());
6984 CheckSSLInfo(r
->ssl_info());
6986 EXPECT_EQ(0, d
.bytes_received());
6992 TEST_F(HTTPSRequestTest
, HTTPSExpiredTest
) {
6993 SpawnedTestServer::SSLOptions
ssl_options(
6994 SpawnedTestServer::SSLOptions::CERT_EXPIRED
);
6995 SpawnedTestServer
test_server(
6996 SpawnedTestServer::TYPE_HTTPS
,
6998 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
6999 ASSERT_TRUE(test_server
.Start());
7001 // Iterate from false to true, just so that we do the opposite of the
7002 // previous test in order to increase test coverage.
7003 bool err_allowed
= false;
7004 for (int i
= 0; i
< 2 ; i
++, err_allowed
= !err_allowed
) {
7007 d
.set_allow_certificate_errors(err_allowed
);
7008 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7009 test_server
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
7012 EXPECT_TRUE(r
->is_pending());
7014 base::RunLoop().Run();
7016 EXPECT_EQ(1, d
.response_started_count());
7017 EXPECT_FALSE(d
.received_data_before_response());
7018 EXPECT_TRUE(d
.have_certificate_errors());
7020 EXPECT_NE(0, d
.bytes_received());
7021 CheckSSLInfo(r
->ssl_info());
7023 EXPECT_EQ(0, d
.bytes_received());
7029 // This tests that a load of www.google.com with a certificate error sets
7030 // the |certificate_errors_are_fatal| flag correctly. This flag will cause
7031 // the interstitial to be fatal.
7032 TEST_F(HTTPSRequestTest
, HTTPSPreloadedHSTSTest
) {
7033 SpawnedTestServer::SSLOptions
ssl_options(
7034 SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME
);
7035 SpawnedTestServer
test_server(
7036 SpawnedTestServer::TYPE_HTTPS
,
7038 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7039 ASSERT_TRUE(test_server
.Start());
7041 // We require that the URL be www.google.com in order to pick up the
7042 // preloaded HSTS entries in the TransportSecurityState. This means that we
7043 // have to use a MockHostResolver in order to direct www.google.com to the
7044 // testserver. By default, MockHostResolver maps all hosts to 127.0.0.1.
7046 MockHostResolver host_resolver
;
7047 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
7048 TestURLRequestContext
context(true);
7049 context
.set_network_delegate(&network_delegate
);
7050 context
.set_host_resolver(&host_resolver
);
7051 TransportSecurityState transport_security_state
;
7052 context
.set_transport_security_state(&transport_security_state
);
7056 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
7057 GURL(base::StringPrintf("https://www.google.com:%d",
7058 test_server
.host_port_pair().port())),
7059 DEFAULT_PRIORITY
, &d
, NULL
));
7062 EXPECT_TRUE(r
->is_pending());
7064 base::RunLoop().Run();
7066 EXPECT_EQ(1, d
.response_started_count());
7067 EXPECT_FALSE(d
.received_data_before_response());
7068 EXPECT_TRUE(d
.have_certificate_errors());
7069 EXPECT_TRUE(d
.certificate_errors_are_fatal());
7072 // This tests that cached HTTPS page loads do not cause any updates to the
7073 // TransportSecurityState.
7074 TEST_F(HTTPSRequestTest
, HTTPSErrorsNoClobberTSSTest
) {
7075 // The actual problem -- CERT_MISMATCHED_NAME in this case -- doesn't
7076 // matter. It just has to be any error.
7077 SpawnedTestServer::SSLOptions
ssl_options(
7078 SpawnedTestServer::SSLOptions::CERT_MISMATCHED_NAME
);
7079 SpawnedTestServer
test_server(
7080 SpawnedTestServer::TYPE_HTTPS
,
7082 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7083 ASSERT_TRUE(test_server
.Start());
7085 // We require that the URL be www.google.com in order to pick up the static
7086 // and dynamic STS and PKP entries in the TransportSecurityState. This means
7087 // that we have to use a MockHostResolver in order to direct www.google.com to
7088 // the testserver. By default, MockHostResolver maps all hosts to 127.0.0.1.
7090 MockHostResolver host_resolver
;
7091 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
7092 TestURLRequestContext
context(true);
7093 context
.set_network_delegate(&network_delegate
);
7094 context
.set_host_resolver(&host_resolver
);
7095 TransportSecurityState transport_security_state
;
7097 TransportSecurityState::DomainState static_domain_state
;
7098 EXPECT_TRUE(transport_security_state
.GetStaticDomainState(
7099 "www.google.com", &static_domain_state
));
7100 context
.set_transport_security_state(&transport_security_state
);
7103 TransportSecurityState::DomainState dynamic_domain_state
;
7104 EXPECT_FALSE(transport_security_state
.GetDynamicDomainState(
7105 "www.google.com", &dynamic_domain_state
));
7108 scoped_ptr
<URLRequest
> r(context
.CreateRequest(
7109 GURL(base::StringPrintf("https://www.google.com:%d",
7110 test_server
.host_port_pair().port())),
7111 DEFAULT_PRIORITY
, &d
, NULL
));
7114 EXPECT_TRUE(r
->is_pending());
7116 base::RunLoop().Run();
7118 EXPECT_EQ(1, d
.response_started_count());
7119 EXPECT_FALSE(d
.received_data_before_response());
7120 EXPECT_TRUE(d
.have_certificate_errors());
7121 EXPECT_TRUE(d
.certificate_errors_are_fatal());
7123 // Get a fresh copy of the states, and check that they haven't changed.
7124 TransportSecurityState::DomainState new_static_domain_state
;
7125 EXPECT_TRUE(transport_security_state
.GetStaticDomainState(
7126 "www.google.com", &new_static_domain_state
));
7127 TransportSecurityState::DomainState new_dynamic_domain_state
;
7128 EXPECT_FALSE(transport_security_state
.GetDynamicDomainState(
7129 "www.google.com", &new_dynamic_domain_state
));
7131 EXPECT_EQ(new_static_domain_state
.sts
.upgrade_mode
,
7132 static_domain_state
.sts
.upgrade_mode
);
7133 EXPECT_EQ(new_static_domain_state
.sts
.include_subdomains
,
7134 static_domain_state
.sts
.include_subdomains
);
7135 EXPECT_EQ(new_static_domain_state
.pkp
.include_subdomains
,
7136 static_domain_state
.pkp
.include_subdomains
);
7137 EXPECT_TRUE(FingerprintsEqual(new_static_domain_state
.pkp
.spki_hashes
,
7138 static_domain_state
.pkp
.spki_hashes
));
7139 EXPECT_TRUE(FingerprintsEqual(new_static_domain_state
.pkp
.bad_spki_hashes
,
7140 static_domain_state
.pkp
.bad_spki_hashes
));
7143 // Make sure HSTS preserves a POST request's method and body.
7144 TEST_F(HTTPSRequestTest
, HSTSPreservesPosts
) {
7145 static const char kData
[] = "hello world";
7147 SpawnedTestServer::SSLOptions
ssl_options(
7148 SpawnedTestServer::SSLOptions::CERT_OK
);
7149 SpawnedTestServer
test_server(
7150 SpawnedTestServer::TYPE_HTTPS
,
7152 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7153 ASSERT_TRUE(test_server
.Start());
7156 // Per spec, TransportSecurityState expects a domain name, rather than an IP
7157 // address, so a MockHostResolver is needed to redirect www.somewhere.com to
7158 // the SpawnedTestServer. By default, MockHostResolver maps all hosts
7160 MockHostResolver host_resolver
;
7162 // Force https for www.somewhere.com.
7163 TransportSecurityState transport_security_state
;
7164 base::Time expiry
= base::Time::Now() + base::TimeDelta::FromDays(1000);
7165 bool include_subdomains
= false;
7166 transport_security_state
.AddHSTS("www.somewhere.com", expiry
,
7167 include_subdomains
);
7169 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
7171 TestURLRequestContext
context(true);
7172 context
.set_host_resolver(&host_resolver
);
7173 context
.set_transport_security_state(&transport_security_state
);
7174 context
.set_network_delegate(&network_delegate
);
7178 // Navigating to https://www.somewhere.com instead of https://127.0.0.1 will
7179 // cause a certificate error. Ignore the error.
7180 d
.set_allow_certificate_errors(true);
7182 scoped_ptr
<URLRequest
> req(context
.CreateRequest(
7183 GURL(base::StringPrintf("http://www.somewhere.com:%d/echo",
7184 test_server
.host_port_pair().port())),
7185 DEFAULT_PRIORITY
, &d
, NULL
));
7186 req
->set_method("POST");
7187 req
->set_upload(CreateSimpleUploadData(kData
));
7190 base::RunLoop().Run();
7192 EXPECT_EQ("https", req
->url().scheme());
7193 EXPECT_EQ("POST", req
->method());
7194 EXPECT_EQ(kData
, d
.data_received());
7196 LoadTimingInfo load_timing_info
;
7197 network_delegate
.GetLoadTimingInfoBeforeRedirect(&load_timing_info
);
7198 // LoadTimingInfo of HSTS redirects is similar to that of network cache hits
7199 TestLoadTimingCacheHitNoNetwork(load_timing_info
);
7202 // Make sure that the CORS headers are added to cross-origin HSTS redirects.
7203 TEST_F(HTTPSRequestTest
, HSTSCrossOriginAddHeaders
) {
7204 static const char kOriginHeaderValue
[] = "http://www.example.com";
7206 SpawnedTestServer::SSLOptions
ssl_options(
7207 SpawnedTestServer::SSLOptions::CERT_OK
);
7208 SpawnedTestServer
test_server(
7209 SpawnedTestServer::TYPE_HTTPS
,
7211 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7212 ASSERT_TRUE(test_server
.Start());
7214 // Per spec, TransportSecurityState expects a domain name, rather than an IP
7215 // address, so a MockHostResolver is needed to redirect example.net to the
7216 // SpawnedTestServer. MockHostResolver maps all hosts to 127.0.0.1 by default.
7217 MockHostResolver host_resolver
;
7219 TransportSecurityState transport_security_state
;
7220 base::Time expiry
= base::Time::Now() + base::TimeDelta::FromDays(1);
7221 bool include_subdomains
= false;
7222 transport_security_state
.AddHSTS("example.net", expiry
, include_subdomains
);
7224 TestNetworkDelegate network_delegate
; // Must outlive URLRequest.
7226 MockCertVerifier cert_verifier
;
7227 cert_verifier
.set_default_result(OK
);
7229 TestURLRequestContext
context(true);
7230 context
.set_host_resolver(&host_resolver
);
7231 context
.set_transport_security_state(&transport_security_state
);
7232 context
.set_network_delegate(&network_delegate
);
7233 context
.set_cert_verifier(&cert_verifier
);
7236 GURL
hsts_http_url(base::StringPrintf("http://example.net:%d/somehstssite",
7237 test_server
.host_port_pair().port()));
7238 url::Replacements
<char> replacements
;
7239 const char kNewScheme
[] = "https";
7240 replacements
.SetScheme(kNewScheme
, url::Component(0, strlen(kNewScheme
)));
7241 GURL hsts_https_url
= hsts_http_url
.ReplaceComponents(replacements
);
7244 // Quit on redirect to allow response header inspection upon redirect.
7245 d
.set_quit_on_redirect(true);
7247 scoped_ptr
<URLRequest
> req(context
.CreateRequest(hsts_http_url
,
7248 DEFAULT_PRIORITY
, &d
, NULL
));
7249 // Set Origin header to simulate a cross-origin request.
7250 HttpRequestHeaders request_headers
;
7251 request_headers
.SetHeader("Origin", kOriginHeaderValue
);
7252 req
->SetExtraRequestHeaders(request_headers
);
7255 base::RunLoop().Run();
7257 EXPECT_EQ(1, d
.received_redirect_count());
7259 const HttpResponseHeaders
* headers
= req
->response_headers();
7260 std::string redirect_location
;
7261 EXPECT_TRUE(headers
->EnumerateHeader(NULL
, "Location", &redirect_location
));
7262 EXPECT_EQ(hsts_https_url
.spec(), redirect_location
);
7264 std::string received_cors_header
;
7265 EXPECT_TRUE(headers
->EnumerateHeader(NULL
, "Access-Control-Allow-Origin",
7266 &received_cors_header
));
7267 EXPECT_EQ(kOriginHeaderValue
, received_cors_header
);
7270 // This just tests the behaviour of GetHSTSRedirect(). End-to-end tests of HSTS
7271 // are performed in net/websockets/websocket_end_to_end_test.cc.
7272 TEST(WebSocketURLRequestTest
, HSTSApplied
) {
7273 TestNetworkDelegate network_delegate
;
7274 TransportSecurityState transport_security_state
;
7275 base::Time expiry
= base::Time::Now() + base::TimeDelta::FromDays(1);
7276 bool include_subdomains
= false;
7277 transport_security_state
.AddHSTS("example.net", expiry
, include_subdomains
);
7278 TestURLRequestContext
context(true);
7279 context
.set_transport_security_state(&transport_security_state
);
7280 context
.set_network_delegate(&network_delegate
);
7282 GURL
ws_url("ws://example.net/echo");
7283 TestDelegate delegate
;
7284 scoped_ptr
<URLRequest
> request(
7285 context
.CreateRequest(ws_url
, DEFAULT_PRIORITY
, &delegate
, NULL
));
7286 EXPECT_TRUE(request
->GetHSTSRedirect(&ws_url
));
7287 EXPECT_TRUE(ws_url
.SchemeIs("wss"));
7292 class SSLClientAuthTestDelegate
: public TestDelegate
{
7294 SSLClientAuthTestDelegate() : on_certificate_requested_count_(0) {
7296 void OnCertificateRequested(URLRequest
* request
,
7297 SSLCertRequestInfo
* cert_request_info
) override
{
7298 on_certificate_requested_count_
++;
7299 base::MessageLoop::current()->Quit();
7301 int on_certificate_requested_count() {
7302 return on_certificate_requested_count_
;
7305 int on_certificate_requested_count_
;
7310 // TODO(davidben): Test the rest of the code. Specifically,
7311 // - Filtering which certificates to select.
7312 // - Sending a certificate back.
7313 // - Getting a certificate request in an SSL renegotiation sending the
7315 TEST_F(HTTPSRequestTest
, ClientAuthTest
) {
7316 SpawnedTestServer::SSLOptions ssl_options
;
7317 ssl_options
.request_client_certificate
= true;
7318 SpawnedTestServer
test_server(
7319 SpawnedTestServer::TYPE_HTTPS
,
7321 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7322 ASSERT_TRUE(test_server
.Start());
7324 SSLClientAuthTestDelegate d
;
7326 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7327 test_server
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
7330 EXPECT_TRUE(r
->is_pending());
7332 base::RunLoop().Run();
7334 EXPECT_EQ(1, d
.on_certificate_requested_count());
7335 EXPECT_FALSE(d
.received_data_before_response());
7336 EXPECT_EQ(0, d
.bytes_received());
7338 // Send no certificate.
7339 // TODO(davidben): Get temporary client cert import (with keys) working on
7340 // all platforms so we can test sending a cert as well.
7341 r
->ContinueWithCertificate(NULL
);
7343 base::RunLoop().Run();
7345 EXPECT_EQ(1, d
.response_started_count());
7346 EXPECT_FALSE(d
.received_data_before_response());
7347 EXPECT_NE(0, d
.bytes_received());
7351 TEST_F(HTTPSRequestTest
, ResumeTest
) {
7352 // Test that we attempt a session resume when making two connections to the
7354 SpawnedTestServer::SSLOptions ssl_options
;
7355 ssl_options
.record_resume
= true;
7356 SpawnedTestServer
test_server(
7357 SpawnedTestServer::TYPE_HTTPS
,
7359 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7360 ASSERT_TRUE(test_server
.Start());
7362 SSLClientSocket::ClearSessionCache();
7366 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7367 test_server
.GetURL("ssl-session-cache"), DEFAULT_PRIORITY
, &d
, NULL
));
7370 EXPECT_TRUE(r
->is_pending());
7372 base::RunLoop().Run();
7374 EXPECT_EQ(1, d
.response_started_count());
7377 reinterpret_cast<HttpCache
*>(default_context_
.http_transaction_factory())->
7378 CloseAllConnections();
7382 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7383 test_server
.GetURL("ssl-session-cache"), DEFAULT_PRIORITY
, &d
, NULL
));
7386 EXPECT_TRUE(r
->is_pending());
7388 base::RunLoop().Run();
7390 // The response will look like;
7395 // With a newline at the end which makes the split think that there are
7398 EXPECT_EQ(1, d
.response_started_count());
7399 std::vector
<std::string
> lines
;
7400 base::SplitString(d
.data_received(), '\n', &lines
);
7401 ASSERT_EQ(4u, lines
.size()) << d
.data_received();
7403 std::string session_id
;
7405 for (size_t i
= 0; i
< 2; i
++) {
7406 std::vector
<std::string
> parts
;
7407 base::SplitString(lines
[i
], '\t', &parts
);
7408 ASSERT_EQ(2u, parts
.size());
7410 EXPECT_EQ("insert", parts
[0]);
7411 session_id
= parts
[1];
7413 EXPECT_EQ("lookup", parts
[0]);
7414 EXPECT_EQ(session_id
, parts
[1]);
7420 // AssertTwoDistinctSessionsInserted checks that |session_info|, which must be
7421 // the result of fetching "ssl-session-cache" from the test server, indicates
7422 // that exactly two different sessions were inserted, with no lookups etc.
7423 static void AssertTwoDistinctSessionsInserted(const string
& session_info
) {
7424 std::vector
<std::string
> lines
;
7425 base::SplitString(session_info
, '\n', &lines
);
7426 ASSERT_EQ(3u, lines
.size()) << session_info
;
7428 std::string session_id
;
7429 for (size_t i
= 0; i
< 2; i
++) {
7430 std::vector
<std::string
> parts
;
7431 base::SplitString(lines
[i
], '\t', &parts
);
7432 ASSERT_EQ(2u, parts
.size());
7433 EXPECT_EQ("insert", parts
[0]);
7435 session_id
= parts
[1];
7437 EXPECT_NE(session_id
, parts
[1]);
7442 TEST_F(HTTPSRequestTest
, SSLSessionCacheShardTest
) {
7443 // Test that sessions aren't resumed when the value of ssl_session_cache_shard
7445 SpawnedTestServer::SSLOptions ssl_options
;
7446 ssl_options
.record_resume
= true;
7447 SpawnedTestServer
test_server(
7448 SpawnedTestServer::TYPE_HTTPS
,
7450 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7451 ASSERT_TRUE(test_server
.Start());
7453 SSLClientSocket::ClearSessionCache();
7457 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7458 test_server
.GetURL("ssl-session-cache"), DEFAULT_PRIORITY
, &d
, NULL
));
7461 EXPECT_TRUE(r
->is_pending());
7463 base::RunLoop().Run();
7465 EXPECT_EQ(1, d
.response_started_count());
7468 // Now create a new HttpCache with a different ssl_session_cache_shard value.
7469 HttpNetworkSession::Params params
;
7470 params
.host_resolver
= default_context_
.host_resolver();
7471 params
.cert_verifier
= default_context_
.cert_verifier();
7472 params
.transport_security_state
= default_context_
.transport_security_state();
7473 params
.proxy_service
= default_context_
.proxy_service();
7474 params
.ssl_config_service
= default_context_
.ssl_config_service();
7475 params
.http_auth_handler_factory
=
7476 default_context_
.http_auth_handler_factory();
7477 params
.network_delegate
= &default_network_delegate_
;
7478 params
.http_server_properties
= default_context_
.http_server_properties();
7479 params
.ssl_session_cache_shard
= "alternate";
7481 scoped_ptr
<HttpCache
> cache(new HttpCache(
7482 new HttpNetworkSession(params
),
7483 HttpCache::DefaultBackend::InMemory(0)));
7485 default_context_
.set_http_transaction_factory(cache
.get());
7489 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7490 test_server
.GetURL("ssl-session-cache"), DEFAULT_PRIORITY
, &d
, NULL
));
7493 EXPECT_TRUE(r
->is_pending());
7495 base::RunLoop().Run();
7497 // The response will look like;
7501 // With a newline at the end which makes the split think that there are
7504 EXPECT_EQ(1, d
.response_started_count());
7505 AssertTwoDistinctSessionsInserted(d
.data_received());
7513 bool IsECDSACipherSuite(uint16_t cipher_suite
) {
7514 const char* key_exchange
;
7518 SSLCipherSuiteToStrings(&key_exchange
, &cipher
, &mac
, &is_aead
, cipher_suite
);
7519 return std::string(key_exchange
).find("ECDSA") != std::string::npos
;
7524 // Test that ECDSA is disabled on Windows XP, where ECDSA certificates cannot be
7526 TEST_F(HTTPSRequestTest
, DisableECDSAOnXP
) {
7527 if (base::win::GetVersion() >= base::win::VERSION_VISTA
) {
7528 LOG(INFO
) << "Skipping test on this version.";
7532 SpawnedTestServer
test_server(
7533 SpawnedTestServer::TYPE_HTTPS
,
7534 SpawnedTestServer::kLocalhost
,
7535 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7536 ASSERT_TRUE(test_server
.Start());
7539 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7540 test_server
.GetURL("client-cipher-list"), DEFAULT_PRIORITY
, &d
, NULL
));
7542 EXPECT_TRUE(r
->is_pending());
7544 base::RunLoop().Run();
7546 EXPECT_EQ(1, d
.response_started_count());
7547 std::vector
<std::string
> lines
;
7548 base::SplitString(d
.data_received(), '\n', &lines
);
7550 for (size_t i
= 0; i
< lines
.size(); i
++) {
7552 ASSERT_TRUE(base::StringToInt(lines
[i
], &cipher_suite
));
7553 EXPECT_FALSE(IsECDSACipherSuite(cipher_suite
))
7554 << "ClientHello advertised " << cipher_suite
;
7560 class TestSSLConfigService
: public SSLConfigService
{
7562 TestSSLConfigService(bool ev_enabled
,
7563 bool online_rev_checking
,
7564 bool rev_checking_required_local_anchors
)
7565 : ev_enabled_(ev_enabled
),
7566 online_rev_checking_(online_rev_checking
),
7567 rev_checking_required_local_anchors_(
7568 rev_checking_required_local_anchors
),
7569 min_version_(kDefaultSSLVersionMin
),
7570 fallback_min_version_(kDefaultSSLVersionFallbackMin
) {}
7572 void set_min_version(uint16 version
) {
7573 min_version_
= version
;
7576 void set_fallback_min_version(uint16 version
) {
7577 fallback_min_version_
= version
;
7580 // SSLConfigService:
7581 void GetSSLConfig(SSLConfig
* config
) override
{
7582 *config
= SSLConfig();
7583 config
->rev_checking_enabled
= online_rev_checking_
;
7584 config
->verify_ev_cert
= ev_enabled_
;
7585 config
->rev_checking_required_local_anchors
=
7586 rev_checking_required_local_anchors_
;
7587 if (fallback_min_version_
) {
7588 config
->version_fallback_min
= fallback_min_version_
;
7591 config
->version_min
= min_version_
;
7596 ~TestSSLConfigService() override
{}
7599 const bool ev_enabled_
;
7600 const bool online_rev_checking_
;
7601 const bool rev_checking_required_local_anchors_
;
7602 uint16 min_version_
;
7603 uint16 fallback_min_version_
;
7606 class FallbackTestURLRequestContext
: public TestURLRequestContext
{
7608 explicit FallbackTestURLRequestContext(bool delay_initialization
)
7609 : TestURLRequestContext(delay_initialization
) {}
7611 void set_fallback_min_version(uint16 version
) {
7612 TestSSLConfigService
*ssl_config_service
=
7613 new TestSSLConfigService(true /* check for EV */,
7614 false /* online revocation checking */,
7615 false /* require rev. checking for local
7617 ssl_config_service
->set_min_version(SSL_PROTOCOL_VERSION_SSL3
);
7618 ssl_config_service
->set_fallback_min_version(version
);
7619 set_ssl_config_service(ssl_config_service
);
7623 class HTTPSFallbackTest
: public testing::Test
{
7625 HTTPSFallbackTest() : context_(true) {}
7626 ~HTTPSFallbackTest() override
{}
7629 void DoFallbackTest(const SpawnedTestServer::SSLOptions
& ssl_options
) {
7632 delegate_
.set_allow_certificate_errors(true);
7634 SpawnedTestServer
test_server(
7635 SpawnedTestServer::TYPE_HTTPS
,
7637 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7638 ASSERT_TRUE(test_server
.Start());
7640 request_
= context_
.CreateRequest(
7641 test_server
.GetURL(std::string()), DEFAULT_PRIORITY
, &delegate_
, NULL
);
7644 base::RunLoop().Run();
7647 void set_fallback_min_version(uint16 version
) {
7648 context_
.set_fallback_min_version(version
);
7651 void ExpectConnection(int version
) {
7652 EXPECT_EQ(1, delegate_
.response_started_count());
7653 EXPECT_NE(0, delegate_
.bytes_received());
7654 EXPECT_EQ(version
, SSLConnectionStatusToVersion(
7655 request_
->ssl_info().connection_status
));
7656 EXPECT_TRUE(request_
->ssl_info().connection_status
&
7657 SSL_CONNECTION_VERSION_FALLBACK
);
7660 void ExpectFailure(int error
) {
7661 EXPECT_EQ(1, delegate_
.response_started_count());
7662 EXPECT_FALSE(request_
->status().is_success());
7663 EXPECT_EQ(URLRequestStatus::FAILED
, request_
->status().status());
7664 EXPECT_EQ(error
, request_
->status().error());
7668 TestDelegate delegate_
;
7669 FallbackTestURLRequestContext context_
;
7670 scoped_ptr
<URLRequest
> request_
;
7673 // Tests TLSv1.1 -> TLSv1 fallback. Verifies that we don't fall back more
7675 TEST_F(HTTPSFallbackTest
, TLSv1Fallback
) {
7676 SpawnedTestServer::SSLOptions
ssl_options(
7677 SpawnedTestServer::SSLOptions::CERT_OK
);
7678 ssl_options
.tls_intolerant
=
7679 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1
;
7681 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7682 ExpectConnection(SSL_CONNECTION_VERSION_TLS1
);
7685 // This test is disabled on Android because the remote test server doesn't cause
7687 #if !defined(OS_ANDROID)
7688 // Tests fallback to TLS 1.0 on connection reset.
7689 TEST_F(HTTPSFallbackTest
, TLSv1FallbackReset
) {
7690 SpawnedTestServer::SSLOptions
ssl_options(
7691 SpawnedTestServer::SSLOptions::CERT_OK
);
7692 ssl_options
.tls_intolerant
=
7693 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1
;
7694 ssl_options
.tls_intolerance_type
=
7695 SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_RESET
;
7697 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7698 ExpectConnection(SSL_CONNECTION_VERSION_TLS1
);
7700 #endif // !OS_ANDROID
7702 // Tests that we don't fallback on handshake failure with servers that implement
7703 // TLS_FALLBACK_SCSV. Also ensure that the original error code is reported.
7704 TEST_F(HTTPSFallbackTest
, FallbackSCSV
) {
7705 SpawnedTestServer::SSLOptions
ssl_options(
7706 SpawnedTestServer::SSLOptions::CERT_OK
);
7707 // Configure HTTPS server to be intolerant of TLS >= 1.1 in order to trigger
7708 // a version fallback.
7709 ssl_options
.tls_intolerant
=
7710 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1
;
7711 // Have the server process TLS_FALLBACK_SCSV so that version fallback
7712 // connections are rejected.
7713 ssl_options
.fallback_scsv_enabled
= true;
7715 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7717 // ERR_SSL_VERSION_OR_CIPHER_MISMATCH is how the server simulates version
7718 // intolerance. If the fallback SCSV is processed when the original error
7719 // that caused the fallback should be returned, which should be
7720 // ERR_SSL_VERSION_OR_CIPHER_MISMATCH.
7721 ExpectFailure(ERR_SSL_VERSION_OR_CIPHER_MISMATCH
);
7724 // Tests that we don't fallback on connection closed with servers that implement
7725 // TLS_FALLBACK_SCSV. Also ensure that the original error code is reported.
7726 TEST_F(HTTPSFallbackTest
, FallbackSCSVClosed
) {
7727 SpawnedTestServer::SSLOptions
ssl_options(
7728 SpawnedTestServer::SSLOptions::CERT_OK
);
7729 // Configure HTTPS server to be intolerant of TLS >= 1.1 in order to trigger
7730 // a version fallback.
7731 ssl_options
.tls_intolerant
=
7732 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1
;
7733 ssl_options
.tls_intolerance_type
=
7734 SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE
;
7735 // Have the server process TLS_FALLBACK_SCSV so that version fallback
7736 // connections are rejected.
7737 ssl_options
.fallback_scsv_enabled
= true;
7739 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7741 // The original error should be replayed on rejected fallback.
7742 ExpectFailure(ERR_CONNECTION_CLOSED
);
7745 // Tests that the SSLv3 fallback doesn't happen by default.
7746 TEST_F(HTTPSFallbackTest
, SSLv3Fallback
) {
7747 SpawnedTestServer::SSLOptions
ssl_options(
7748 SpawnedTestServer::SSLOptions::CERT_OK
);
7749 ssl_options
.tls_intolerant
=
7750 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL
;
7752 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7753 ExpectFailure(ERR_SSL_VERSION_OR_CIPHER_MISMATCH
);
7756 // Tests that the SSLv3 fallback works when explicitly enabled.
7757 TEST_F(HTTPSFallbackTest
, SSLv3FallbackEnabled
) {
7758 SpawnedTestServer::SSLOptions
ssl_options(
7759 SpawnedTestServer::SSLOptions::CERT_OK
);
7760 ssl_options
.tls_intolerant
=
7761 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL
;
7762 set_fallback_min_version(SSL_PROTOCOL_VERSION_SSL3
);
7764 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7765 ExpectConnection(SSL_CONNECTION_VERSION_SSL3
);
7768 // Tests that the SSLv3 fallback triggers on closed connections when explicitly
7770 TEST_F(HTTPSFallbackTest
, SSLv3FallbackClosed
) {
7771 SpawnedTestServer::SSLOptions
ssl_options(
7772 SpawnedTestServer::SSLOptions::CERT_OK
);
7773 ssl_options
.tls_intolerant
=
7774 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL
;
7775 ssl_options
.tls_intolerance_type
=
7776 SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE
;
7777 set_fallback_min_version(SSL_PROTOCOL_VERSION_SSL3
);
7779 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7780 ExpectConnection(SSL_CONNECTION_VERSION_SSL3
);
7783 // Test that SSLv3 fallback probe connections don't cause sessions to be cached.
7784 TEST_F(HTTPSRequestTest
, SSLv3FallbackNoCache
) {
7785 SpawnedTestServer::SSLOptions
ssl_options(
7786 SpawnedTestServer::SSLOptions::CERT_OK
);
7787 ssl_options
.tls_intolerant
=
7788 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL
;
7789 ssl_options
.tls_intolerance_type
=
7790 SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE
;
7791 ssl_options
.record_resume
= true;
7793 SpawnedTestServer
test_server(
7794 SpawnedTestServer::TYPE_HTTPS
,
7796 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7797 ASSERT_TRUE(test_server
.Start());
7799 SSLClientSocket::ClearSessionCache();
7801 // Make a connection that does a probe fallback to SSLv3 but fails because
7802 // SSLv3 fallback is disabled. We don't wish a session for this connection to
7803 // be inserted locally.
7805 TestDelegate delegate
;
7806 FallbackTestURLRequestContext
context(true);
7808 context
.set_fallback_min_version(SSL_PROTOCOL_VERSION_TLS1
);
7810 scoped_ptr
<URLRequest
> request(context
.CreateRequest(
7811 test_server
.GetURL(std::string()), DEFAULT_PRIORITY
, &delegate
, NULL
));
7814 base::RunLoop().Run();
7816 EXPECT_EQ(1, delegate
.response_started_count());
7817 EXPECT_FALSE(request
->status().is_success());
7818 EXPECT_EQ(URLRequestStatus::FAILED
, request
->status().status());
7819 EXPECT_EQ(ERR_SSL_FALLBACK_BEYOND_MINIMUM_VERSION
,
7820 request
->status().error());
7823 // Now allow SSLv3 connections and request the session cache log.
7825 TestDelegate delegate
;
7826 FallbackTestURLRequestContext
context(true);
7827 context
.set_fallback_min_version(SSL_PROTOCOL_VERSION_SSL3
);
7830 scoped_ptr
<URLRequest
> request(
7831 context
.CreateRequest(test_server
.GetURL("ssl-session-cache"),
7837 base::RunLoop().Run();
7839 EXPECT_EQ(1, delegate
.response_started_count());
7840 EXPECT_NE(0, delegate
.bytes_received());
7841 EXPECT_EQ(SSL_CONNECTION_VERSION_SSL3
, SSLConnectionStatusToVersion(
7842 request
->ssl_info().connection_status
));
7843 EXPECT_TRUE(request
->ssl_info().connection_status
&
7844 SSL_CONNECTION_VERSION_FALLBACK
);
7846 std::vector
<std::string
> lines
;
7847 // If no sessions were cached then the server should have seen two sessions
7848 // inserted with no lookups.
7849 AssertTwoDistinctSessionsInserted(delegate
.data_received());
7853 // This test is disabled on Android because the remote test server doesn't cause
7855 #if !defined(OS_ANDROID)
7856 // Tests that a reset connection does not fallback down to SSL3.
7857 TEST_F(HTTPSFallbackTest
, SSLv3NoFallbackReset
) {
7858 SpawnedTestServer::SSLOptions
ssl_options(
7859 SpawnedTestServer::SSLOptions::CERT_OK
);
7860 ssl_options
.tls_intolerant
=
7861 SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL
;
7862 ssl_options
.tls_intolerance_type
=
7863 SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_RESET
;
7865 ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options
));
7866 ExpectFailure(ERR_CONNECTION_RESET
);
7868 #endif // !OS_ANDROID
7870 class HTTPSSessionTest
: public testing::Test
{
7872 HTTPSSessionTest() : default_context_(true) {
7873 cert_verifier_
.set_default_result(OK
);
7875 default_context_
.set_network_delegate(&default_network_delegate_
);
7876 default_context_
.set_cert_verifier(&cert_verifier_
);
7877 default_context_
.Init();
7879 ~HTTPSSessionTest() override
{}
7882 MockCertVerifier cert_verifier_
;
7883 TestNetworkDelegate default_network_delegate_
; // Must outlive URLRequest.
7884 TestURLRequestContext default_context_
;
7887 // Tests that session resumption is not attempted if an invalid certificate
7889 TEST_F(HTTPSSessionTest
, DontResumeSessionsForInvalidCertificates
) {
7890 SpawnedTestServer::SSLOptions ssl_options
;
7891 ssl_options
.record_resume
= true;
7892 SpawnedTestServer
test_server(
7893 SpawnedTestServer::TYPE_HTTPS
,
7895 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
7896 ASSERT_TRUE(test_server
.Start());
7898 SSLClientSocket::ClearSessionCache();
7900 // Simulate the certificate being expired and attempt a connection.
7901 cert_verifier_
.set_default_result(ERR_CERT_DATE_INVALID
);
7904 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7905 test_server
.GetURL("ssl-session-cache"), DEFAULT_PRIORITY
, &d
, NULL
));
7908 EXPECT_TRUE(r
->is_pending());
7910 base::RunLoop().Run();
7912 EXPECT_EQ(1, d
.response_started_count());
7915 reinterpret_cast<HttpCache
*>(default_context_
.http_transaction_factory())->
7916 CloseAllConnections();
7918 // Now change the certificate to be acceptable (so that the response is
7919 // loaded), and ensure that no session id is presented to the peer.
7920 cert_verifier_
.set_default_result(OK
);
7923 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
7924 test_server
.GetURL("ssl-session-cache"), DEFAULT_PRIORITY
, &d
, NULL
));
7927 EXPECT_TRUE(r
->is_pending());
7929 base::RunLoop().Run();
7931 // The response will look like;
7935 // With a newline at the end which makes the split think that there are
7938 // If a session was presented (eg: a bug), then the response would look
7944 EXPECT_EQ(1, d
.response_started_count());
7945 AssertTwoDistinctSessionsInserted(d
.data_received());
7949 // This the fingerprint of the "Testing CA" certificate used by the testserver.
7950 // See net/data/ssl/certificates/ocsp-test-root.pem.
7951 static const SHA1HashValue kOCSPTestCertFingerprint
=
7952 { { 0xf1, 0xad, 0xf6, 0xce, 0x42, 0xac, 0xe7, 0xb4, 0xf4, 0x24,
7953 0xdb, 0x1a, 0xf7, 0xa0, 0x9f, 0x09, 0xa1, 0xea, 0xf1, 0x5c } };
7955 // This is the SHA256, SPKI hash of the "Testing CA" certificate used by the
7957 static const SHA256HashValue kOCSPTestCertSPKI
= { {
7958 0xee, 0xe6, 0x51, 0x2d, 0x4c, 0xfa, 0xf7, 0x3e,
7959 0x6c, 0xd8, 0xca, 0x67, 0xed, 0xb5, 0x5d, 0x49,
7960 0x76, 0xe1, 0x52, 0xa7, 0x6e, 0x0e, 0xa0, 0x74,
7961 0x09, 0x75, 0xe6, 0x23, 0x24, 0xbd, 0x1b, 0x28,
7964 // This is the policy OID contained in the certificates that testserver
7966 static const char kOCSPTestCertPolicy
[] = "1.3.6.1.4.1.11129.2.4.1";
7968 class HTTPSOCSPTest
: public HTTPSRequestTest
{
7973 new ScopedTestEVPolicy(EVRootCAMetadata::GetInstance(),
7974 kOCSPTestCertFingerprint
,
7975 kOCSPTestCertPolicy
)) {
7978 void SetUp() override
{
7979 SetupContext(&context_
);
7982 scoped_refptr
<X509Certificate
> root_cert
=
7983 ImportCertFromFile(GetTestCertsDirectory(), "ocsp-test-root.pem");
7984 CHECK_NE(static_cast<X509Certificate
*>(NULL
), root_cert
.get());
7985 test_root_
.reset(new ScopedTestRoot(root_cert
.get()));
7987 #if defined(USE_NSS) || defined(OS_IOS)
7988 SetURLRequestContextForNSSHttpIO(&context_
);
7989 EnsureNSSHttpIOInit();
7993 void DoConnection(const SpawnedTestServer::SSLOptions
& ssl_options
,
7994 CertStatus
* out_cert_status
) {
7995 // We always overwrite out_cert_status.
7996 *out_cert_status
= 0;
7997 SpawnedTestServer
test_server(
7998 SpawnedTestServer::TYPE_HTTPS
,
8000 base::FilePath(FILE_PATH_LITERAL("net/data/ssl")));
8001 ASSERT_TRUE(test_server
.Start());
8004 d
.set_allow_certificate_errors(true);
8005 scoped_ptr
<URLRequest
> r(context_
.CreateRequest(
8006 test_server
.GetURL(std::string()), DEFAULT_PRIORITY
, &d
, NULL
));
8009 base::RunLoop().Run();
8011 EXPECT_EQ(1, d
.response_started_count());
8012 *out_cert_status
= r
->ssl_info().cert_status
;
8015 ~HTTPSOCSPTest() override
{
8016 #if defined(USE_NSS) || defined(OS_IOS)
8017 ShutdownNSSHttpIO();
8022 // SetupContext configures the URLRequestContext that will be used for making
8023 // connetions to testserver. This can be overridden in test subclasses for
8024 // different behaviour.
8025 virtual void SetupContext(URLRequestContext
* context
) {
8026 context
->set_ssl_config_service(
8027 new TestSSLConfigService(true /* check for EV */,
8028 true /* online revocation checking */,
8029 false /* require rev. checking for local
8033 scoped_ptr
<ScopedTestRoot
> test_root_
;
8034 TestURLRequestContext context_
;
8035 scoped_ptr
<ScopedTestEVPolicy
> ev_test_policy_
;
8038 static CertStatus
ExpectedCertStatusForFailedOnlineRevocationCheck() {
8040 // Windows can return CERT_STATUS_UNABLE_TO_CHECK_REVOCATION but we don't
8041 // have that ability on other platforms.
8042 return CERT_STATUS_UNABLE_TO_CHECK_REVOCATION
;
8048 // SystemSupportsHardFailRevocationChecking returns true iff the current
8049 // operating system supports revocation checking and can distinguish between
8050 // situations where a given certificate lacks any revocation information (eg:
8051 // no CRLDistributionPoints and no OCSP Responder AuthorityInfoAccess) and when
8052 // revocation information cannot be obtained (eg: the CRL was unreachable).
8053 // If it does not, then tests which rely on 'hard fail' behaviour should be
8055 static bool SystemSupportsHardFailRevocationChecking() {
8056 #if defined(OS_WIN) || defined(USE_NSS) || defined(OS_IOS)
8063 // SystemUsesChromiumEVMetadata returns true iff the current operating system
8064 // uses Chromium's EV metadata (i.e. EVRootCAMetadata). If it does not, then
8065 // several tests are effected because our testing EV certificate won't be
8066 // recognised as EV.
8067 static bool SystemUsesChromiumEVMetadata() {
8068 #if defined(USE_OPENSSL_CERTS) && !defined(OS_ANDROID)
8069 // http://crbug.com/117478 - OpenSSL does not support EV validation.
8071 #elif (defined(OS_MACOSX) && !defined(OS_IOS)) || defined(OS_ANDROID)
8072 // On OS X and Android, we use the system to tell us whether a certificate is
8073 // EV or not and the system won't recognise our testing root.
8080 static bool SystemSupportsOCSP() {
8081 #if defined(USE_OPENSSL_CERTS)
8082 // http://crbug.com/117478 - OpenSSL does not support OCSP.
8084 #elif defined(OS_WIN)
8085 return base::win::GetVersion() >= base::win::VERSION_VISTA
;
8086 #elif defined(OS_ANDROID)
8087 // TODO(jnd): http://crbug.com/117478 - EV verification is not yet supported.
8094 static bool SystemSupportsOCSPStapling() {
8095 #if defined(USE_NSS)
8097 #elif defined(OS_WIN)
8098 return base::win::GetVersion() >= base::win::VERSION_VISTA
;
8104 TEST_F(HTTPSOCSPTest
, Valid
) {
8105 if (!SystemSupportsOCSP()) {
8106 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8110 SpawnedTestServer::SSLOptions
ssl_options(
8111 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8112 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_OK
;
8114 CertStatus cert_status
;
8115 DoConnection(ssl_options
, &cert_status
);
8117 EXPECT_EQ(0u, cert_status
& CERT_STATUS_ALL_ERRORS
);
8119 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8120 static_cast<bool>(cert_status
& CERT_STATUS_IS_EV
));
8122 EXPECT_TRUE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8125 TEST_F(HTTPSOCSPTest
, Revoked
) {
8126 if (!SystemSupportsOCSP()) {
8127 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8131 SpawnedTestServer::SSLOptions
ssl_options(
8132 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8133 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_REVOKED
;
8135 CertStatus cert_status
;
8136 DoConnection(ssl_options
, &cert_status
);
8138 #if !(defined(OS_MACOSX) && !defined(OS_IOS))
8139 // Doesn't pass on OS X yet for reasons that need to be investigated.
8140 EXPECT_EQ(CERT_STATUS_REVOKED
, cert_status
& CERT_STATUS_ALL_ERRORS
);
8142 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8143 EXPECT_TRUE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8146 TEST_F(HTTPSOCSPTest
, Invalid
) {
8147 if (!SystemSupportsOCSP()) {
8148 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8152 SpawnedTestServer::SSLOptions
ssl_options(
8153 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8154 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_INVALID
;
8156 CertStatus cert_status
;
8157 DoConnection(ssl_options
, &cert_status
);
8159 EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
8160 cert_status
& CERT_STATUS_ALL_ERRORS
);
8162 // Without a positive OCSP response, we shouldn't show the EV status.
8163 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8164 EXPECT_TRUE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8167 TEST_F(HTTPSOCSPTest
, ValidStapled
) {
8168 if (!SystemSupportsOCSPStapling()) {
8170 << "Skipping test because system doesn't support OCSP stapling";
8174 SpawnedTestServer::SSLOptions
ssl_options(
8175 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8176 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_OK
;
8177 ssl_options
.staple_ocsp_response
= true;
8178 ssl_options
.ocsp_server_unavailable
= true;
8180 CertStatus cert_status
;
8181 DoConnection(ssl_options
, &cert_status
);
8183 EXPECT_EQ(0u, cert_status
& CERT_STATUS_ALL_ERRORS
);
8185 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8186 static_cast<bool>(cert_status
& CERT_STATUS_IS_EV
));
8188 EXPECT_TRUE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8191 // Disabled on NSS ports. See https://crbug.com/431716.
8192 #if defined(USE_NSS)
8193 #define MAYBE_RevokedStapled DISABLED_RevokedStapled
8195 #define MAYBE_RevokedStapled RevokedStapled
8197 TEST_F(HTTPSOCSPTest
, MAYBE_RevokedStapled
) {
8198 if (!SystemSupportsOCSPStapling()) {
8200 << "Skipping test because system doesn't support OCSP stapling";
8204 SpawnedTestServer::SSLOptions
ssl_options(
8205 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8206 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_REVOKED
;
8207 ssl_options
.staple_ocsp_response
= true;
8208 ssl_options
.ocsp_server_unavailable
= true;
8210 CertStatus cert_status
;
8211 DoConnection(ssl_options
, &cert_status
);
8213 EXPECT_EQ(CERT_STATUS_REVOKED
, cert_status
& CERT_STATUS_ALL_ERRORS
);
8214 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8215 EXPECT_TRUE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8218 class HTTPSHardFailTest
: public HTTPSOCSPTest
{
8220 void SetupContext(URLRequestContext
* context
) override
{
8221 context
->set_ssl_config_service(
8222 new TestSSLConfigService(false /* check for EV */,
8223 false /* online revocation checking */,
8224 true /* require rev. checking for local
8229 TEST_F(HTTPSHardFailTest
, FailsOnOCSPInvalid
) {
8230 if (!SystemSupportsOCSP()) {
8231 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8235 if (!SystemSupportsHardFailRevocationChecking()) {
8236 LOG(WARNING
) << "Skipping test because system doesn't support hard fail "
8237 << "revocation checking";
8241 SpawnedTestServer::SSLOptions
ssl_options(
8242 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8243 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_INVALID
;
8245 CertStatus cert_status
;
8246 DoConnection(ssl_options
, &cert_status
);
8248 EXPECT_EQ(CERT_STATUS_REVOKED
,
8249 cert_status
& CERT_STATUS_REVOKED
);
8251 // Without a positive OCSP response, we shouldn't show the EV status.
8252 EXPECT_TRUE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8255 class HTTPSEVCRLSetTest
: public HTTPSOCSPTest
{
8257 void SetupContext(URLRequestContext
* context
) override
{
8258 context
->set_ssl_config_service(
8259 new TestSSLConfigService(true /* check for EV */,
8260 false /* online revocation checking */,
8261 false /* require rev. checking for local
8266 TEST_F(HTTPSEVCRLSetTest
, MissingCRLSetAndInvalidOCSP
) {
8267 if (!SystemSupportsOCSP()) {
8268 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8272 SpawnedTestServer::SSLOptions
ssl_options(
8273 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8274 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_INVALID
;
8275 SSLConfigService::SetCRLSet(scoped_refptr
<CRLSet
>());
8277 CertStatus cert_status
;
8278 DoConnection(ssl_options
, &cert_status
);
8280 EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
8281 cert_status
& CERT_STATUS_ALL_ERRORS
);
8283 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8284 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8285 static_cast<bool>(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
));
8288 TEST_F(HTTPSEVCRLSetTest
, MissingCRLSetAndRevokedOCSP
) {
8289 if (!SystemSupportsOCSP()) {
8290 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8294 SpawnedTestServer::SSLOptions
ssl_options(
8295 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8296 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_REVOKED
;
8297 SSLConfigService::SetCRLSet(scoped_refptr
<CRLSet
>());
8299 CertStatus cert_status
;
8300 DoConnection(ssl_options
, &cert_status
);
8302 // Currently only works for Windows. When using NSS or OS X, it's not
8303 // possible to determine whether the check failed because of actual
8304 // revocation or because there was an OCSP failure.
8306 EXPECT_EQ(CERT_STATUS_REVOKED
, cert_status
& CERT_STATUS_ALL_ERRORS
);
8308 EXPECT_EQ(0u, cert_status
& CERT_STATUS_ALL_ERRORS
);
8311 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8312 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8313 static_cast<bool>(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
));
8316 TEST_F(HTTPSEVCRLSetTest
, MissingCRLSetAndGoodOCSP
) {
8317 if (!SystemSupportsOCSP()) {
8318 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8322 SpawnedTestServer::SSLOptions
ssl_options(
8323 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8324 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_OK
;
8325 SSLConfigService::SetCRLSet(scoped_refptr
<CRLSet
>());
8327 CertStatus cert_status
;
8328 DoConnection(ssl_options
, &cert_status
);
8330 EXPECT_EQ(0u, cert_status
& CERT_STATUS_ALL_ERRORS
);
8332 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8333 static_cast<bool>(cert_status
& CERT_STATUS_IS_EV
));
8334 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8335 static_cast<bool>(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
));
8338 TEST_F(HTTPSEVCRLSetTest
, ExpiredCRLSet
) {
8339 if (!SystemSupportsOCSP()) {
8340 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8344 SpawnedTestServer::SSLOptions
ssl_options(
8345 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8346 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_INVALID
;
8347 SSLConfigService::SetCRLSet(
8348 scoped_refptr
<CRLSet
>(CRLSet::ExpiredCRLSetForTesting()));
8350 CertStatus cert_status
;
8351 DoConnection(ssl_options
, &cert_status
);
8353 EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
8354 cert_status
& CERT_STATUS_ALL_ERRORS
);
8356 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8357 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8358 static_cast<bool>(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
));
8361 TEST_F(HTTPSEVCRLSetTest
, FreshCRLSetCovered
) {
8362 if (!SystemSupportsOCSP()) {
8363 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8367 SpawnedTestServer::SSLOptions
ssl_options(
8368 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8369 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_INVALID
;
8370 SSLConfigService::SetCRLSet(
8371 scoped_refptr
<CRLSet
>(CRLSet::ForTesting(
8372 false, &kOCSPTestCertSPKI
, "")));
8374 CertStatus cert_status
;
8375 DoConnection(ssl_options
, &cert_status
);
8377 // With a fresh CRLSet that covers the issuing certificate, we shouldn't do a
8378 // revocation check for EV.
8379 EXPECT_EQ(0u, cert_status
& CERT_STATUS_ALL_ERRORS
);
8380 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8381 static_cast<bool>(cert_status
& CERT_STATUS_IS_EV
));
8383 static_cast<bool>(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
));
8386 TEST_F(HTTPSEVCRLSetTest
, FreshCRLSetNotCovered
) {
8387 if (!SystemSupportsOCSP()) {
8388 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8392 SpawnedTestServer::SSLOptions
ssl_options(
8393 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8394 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_INVALID
;
8395 SSLConfigService::SetCRLSet(
8396 scoped_refptr
<CRLSet
>(CRLSet::EmptyCRLSetForTesting()));
8398 CertStatus cert_status
= 0;
8399 DoConnection(ssl_options
, &cert_status
);
8401 // Even with a fresh CRLSet, we should still do online revocation checks when
8402 // the certificate chain isn't covered by the CRLSet, which it isn't in this
8404 EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
8405 cert_status
& CERT_STATUS_ALL_ERRORS
);
8407 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8408 EXPECT_EQ(SystemUsesChromiumEVMetadata(),
8409 static_cast<bool>(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
));
8412 TEST_F(HTTPSEVCRLSetTest
, ExpiredCRLSetAndRevokedNonEVCert
) {
8413 // Test that when EV verification is requested, but online revocation
8414 // checking is disabled, and the leaf certificate is not in fact EV, that
8415 // no revocation checking actually happens.
8416 if (!SystemSupportsOCSP()) {
8417 LOG(WARNING
) << "Skipping test because system doesn't support OCSP";
8421 // Unmark the certificate's OID as EV, which should disable revocation
8422 // checking (as per the user preference)
8423 ev_test_policy_
.reset();
8425 SpawnedTestServer::SSLOptions
ssl_options(
8426 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8427 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_REVOKED
;
8428 SSLConfigService::SetCRLSet(
8429 scoped_refptr
<CRLSet
>(CRLSet::ExpiredCRLSetForTesting()));
8431 CertStatus cert_status
;
8432 DoConnection(ssl_options
, &cert_status
);
8434 EXPECT_EQ(0u, cert_status
& CERT_STATUS_ALL_ERRORS
);
8436 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8437 EXPECT_FALSE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8440 class HTTPSCRLSetTest
: public HTTPSOCSPTest
{
8442 void SetupContext(URLRequestContext
* context
) override
{
8443 context
->set_ssl_config_service(
8444 new TestSSLConfigService(false /* check for EV */,
8445 false /* online revocation checking */,
8446 false /* require rev. checking for local
8451 TEST_F(HTTPSCRLSetTest
, ExpiredCRLSet
) {
8452 SpawnedTestServer::SSLOptions
ssl_options(
8453 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8454 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_INVALID
;
8455 SSLConfigService::SetCRLSet(
8456 scoped_refptr
<CRLSet
>(CRLSet::ExpiredCRLSetForTesting()));
8458 CertStatus cert_status
;
8459 DoConnection(ssl_options
, &cert_status
);
8461 // If we're not trying EV verification then, even if the CRLSet has expired,
8462 // we don't fall back to online revocation checks.
8463 EXPECT_EQ(0u, cert_status
& CERT_STATUS_ALL_ERRORS
);
8464 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8465 EXPECT_FALSE(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
);
8468 TEST_F(HTTPSCRLSetTest
, CRLSetRevoked
) {
8469 #if defined(OS_ANDROID)
8470 LOG(WARNING
) << "Skipping test because system doesn't support CRLSets";
8474 SpawnedTestServer::SSLOptions
ssl_options(
8475 SpawnedTestServer::SSLOptions::CERT_AUTO
);
8476 ssl_options
.ocsp_status
= SpawnedTestServer::SSLOptions::OCSP_OK
;
8477 ssl_options
.cert_serial
= 10;
8478 SSLConfigService::SetCRLSet(
8479 scoped_refptr
<CRLSet
>(CRLSet::ForTesting(
8480 false, &kOCSPTestCertSPKI
, "\x0a")));
8482 CertStatus cert_status
= 0;
8483 DoConnection(ssl_options
, &cert_status
);
8485 // If the certificate is recorded as revoked in the CRLSet, that should be
8486 // reflected without online revocation checking.
8487 EXPECT_EQ(CERT_STATUS_REVOKED
, cert_status
& CERT_STATUS_ALL_ERRORS
);
8488 EXPECT_FALSE(cert_status
& CERT_STATUS_IS_EV
);
8490 static_cast<bool>(cert_status
& CERT_STATUS_REV_CHECKING_ENABLED
));
8492 #endif // !defined(OS_IOS)
8494 #if !defined(DISABLE_FTP_SUPPORT)
8495 class URLRequestTestFTP
: public URLRequestTest
{
8498 : test_server_(SpawnedTestServer::TYPE_FTP
, SpawnedTestServer::kLocalhost
,
8503 SpawnedTestServer test_server_
;
8506 // Make sure an FTP request using an unsafe ports fails.
8507 TEST_F(URLRequestTestFTP
, UnsafePort
) {
8508 ASSERT_TRUE(test_server_
.Start());
8510 URLRequestJobFactoryImpl job_factory
;
8511 FtpNetworkLayer
ftp_transaction_factory(default_context_
.host_resolver());
8513 GURL
url("ftp://127.0.0.1:7");
8514 job_factory
.SetProtocolHandler(
8516 new FtpProtocolHandler(&ftp_transaction_factory
));
8517 default_context_
.set_job_factory(&job_factory
);
8521 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8522 url
, DEFAULT_PRIORITY
, &d
, NULL
));
8524 EXPECT_TRUE(r
->is_pending());
8526 base::RunLoop().Run();
8528 EXPECT_FALSE(r
->is_pending());
8529 EXPECT_EQ(URLRequestStatus::FAILED
, r
->status().status());
8530 EXPECT_EQ(ERR_UNSAFE_PORT
, r
->status().error());
8534 // Flaky, see http://crbug.com/25045.
8535 TEST_F(URLRequestTestFTP
, DISABLED_FTPDirectoryListing
) {
8536 ASSERT_TRUE(test_server_
.Start());
8540 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8541 test_server_
.GetURL("/"), DEFAULT_PRIORITY
, &d
, NULL
));
8543 EXPECT_TRUE(r
->is_pending());
8545 base::RunLoop().Run();
8547 EXPECT_FALSE(r
->is_pending());
8548 EXPECT_EQ(1, d
.response_started_count());
8549 EXPECT_FALSE(d
.received_data_before_response());
8550 EXPECT_LT(0, d
.bytes_received());
8551 EXPECT_EQ(test_server_
.host_port_pair().host(),
8552 r
->GetSocketAddress().host());
8553 EXPECT_EQ(test_server_
.host_port_pair().port(),
8554 r
->GetSocketAddress().port());
8558 // Flaky, see http://crbug.com/25045.
8559 TEST_F(URLRequestTestFTP
, DISABLED_FTPGetTestAnonymous
) {
8560 ASSERT_TRUE(test_server_
.Start());
8562 base::FilePath app_path
;
8563 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8564 app_path
= app_path
.AppendASCII("LICENSE");
8567 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8568 test_server_
.GetURL("/LICENSE"), DEFAULT_PRIORITY
, &d
, NULL
));
8570 EXPECT_TRUE(r
->is_pending());
8572 base::RunLoop().Run();
8574 int64 file_size
= 0;
8575 base::GetFileSize(app_path
, &file_size
);
8577 EXPECT_FALSE(r
->is_pending());
8578 EXPECT_EQ(1, d
.response_started_count());
8579 EXPECT_FALSE(d
.received_data_before_response());
8580 EXPECT_EQ(d
.bytes_received(), static_cast<int>(file_size
));
8581 EXPECT_EQ(test_server_
.host_port_pair().host(),
8582 r
->GetSocketAddress().host());
8583 EXPECT_EQ(test_server_
.host_port_pair().port(),
8584 r
->GetSocketAddress().port());
8588 // Flaky, see http://crbug.com/25045.
8589 TEST_F(URLRequestTestFTP
, DISABLED_FTPGetTest
) {
8590 ASSERT_TRUE(test_server_
.Start());
8592 base::FilePath app_path
;
8593 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8594 app_path
= app_path
.AppendASCII("LICENSE");
8597 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8598 test_server_
.GetURLWithUserAndPassword("/LICENSE", "chrome", "chrome"),
8599 DEFAULT_PRIORITY
, &d
, NULL
));
8601 EXPECT_TRUE(r
->is_pending());
8603 base::RunLoop().Run();
8605 int64 file_size
= 0;
8606 base::GetFileSize(app_path
, &file_size
);
8608 EXPECT_FALSE(r
->is_pending());
8609 EXPECT_EQ(test_server_
.host_port_pair().host(),
8610 r
->GetSocketAddress().host());
8611 EXPECT_EQ(test_server_
.host_port_pair().port(),
8612 r
->GetSocketAddress().port());
8613 EXPECT_EQ(1, d
.response_started_count());
8614 EXPECT_FALSE(d
.received_data_before_response());
8615 EXPECT_EQ(d
.bytes_received(), static_cast<int>(file_size
));
8617 LoadTimingInfo load_timing_info
;
8618 r
->GetLoadTimingInfo(&load_timing_info
);
8619 TestLoadTimingNoHttpResponse(load_timing_info
);
8623 // Flaky, see http://crbug.com/25045.
8624 TEST_F(URLRequestTestFTP
, DISABLED_FTPCheckWrongPassword
) {
8625 ASSERT_TRUE(test_server_
.Start());
8627 base::FilePath app_path
;
8628 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8629 app_path
= app_path
.AppendASCII("LICENSE");
8632 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8633 test_server_
.GetURLWithUserAndPassword("/LICENSE", "chrome",
8635 DEFAULT_PRIORITY
, &d
, NULL
));
8637 EXPECT_TRUE(r
->is_pending());
8639 base::RunLoop().Run();
8641 int64 file_size
= 0;
8642 base::GetFileSize(app_path
, &file_size
);
8644 EXPECT_FALSE(r
->is_pending());
8645 EXPECT_EQ(1, d
.response_started_count());
8646 EXPECT_FALSE(d
.received_data_before_response());
8647 EXPECT_EQ(d
.bytes_received(), 0);
8651 // Flaky, see http://crbug.com/25045.
8652 TEST_F(URLRequestTestFTP
, DISABLED_FTPCheckWrongPasswordRestart
) {
8653 ASSERT_TRUE(test_server_
.Start());
8655 base::FilePath app_path
;
8656 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8657 app_path
= app_path
.AppendASCII("LICENSE");
8659 // Set correct login credentials. The delegate will be asked for them when
8660 // the initial login with wrong credentials will fail.
8661 d
.set_credentials(AuthCredentials(kChrome
, kChrome
));
8663 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8664 test_server_
.GetURLWithUserAndPassword("/LICENSE", "chrome",
8666 DEFAULT_PRIORITY
, &d
, NULL
));
8668 EXPECT_TRUE(r
->is_pending());
8670 base::RunLoop().Run();
8672 int64 file_size
= 0;
8673 base::GetFileSize(app_path
, &file_size
);
8675 EXPECT_FALSE(r
->is_pending());
8676 EXPECT_EQ(1, d
.response_started_count());
8677 EXPECT_FALSE(d
.received_data_before_response());
8678 EXPECT_EQ(d
.bytes_received(), static_cast<int>(file_size
));
8682 // Flaky, see http://crbug.com/25045.
8683 TEST_F(URLRequestTestFTP
, DISABLED_FTPCheckWrongUser
) {
8684 ASSERT_TRUE(test_server_
.Start());
8686 base::FilePath app_path
;
8687 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8688 app_path
= app_path
.AppendASCII("LICENSE");
8691 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8692 test_server_
.GetURLWithUserAndPassword("/LICENSE", "wrong_user",
8694 DEFAULT_PRIORITY
, &d
, NULL
));
8696 EXPECT_TRUE(r
->is_pending());
8698 base::RunLoop().Run();
8700 int64 file_size
= 0;
8701 base::GetFileSize(app_path
, &file_size
);
8703 EXPECT_FALSE(r
->is_pending());
8704 EXPECT_EQ(1, d
.response_started_count());
8705 EXPECT_FALSE(d
.received_data_before_response());
8706 EXPECT_EQ(d
.bytes_received(), 0);
8710 // Flaky, see http://crbug.com/25045.
8711 TEST_F(URLRequestTestFTP
, DISABLED_FTPCheckWrongUserRestart
) {
8712 ASSERT_TRUE(test_server_
.Start());
8714 base::FilePath app_path
;
8715 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8716 app_path
= app_path
.AppendASCII("LICENSE");
8718 // Set correct login credentials. The delegate will be asked for them when
8719 // the initial login with wrong credentials will fail.
8720 d
.set_credentials(AuthCredentials(kChrome
, kChrome
));
8722 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8723 test_server_
.GetURLWithUserAndPassword("/LICENSE", "wrong_user",
8725 DEFAULT_PRIORITY
, &d
, NULL
));
8727 EXPECT_TRUE(r
->is_pending());
8729 base::RunLoop().Run();
8731 int64 file_size
= 0;
8732 base::GetFileSize(app_path
, &file_size
);
8734 EXPECT_FALSE(r
->is_pending());
8735 EXPECT_EQ(1, d
.response_started_count());
8736 EXPECT_FALSE(d
.received_data_before_response());
8737 EXPECT_EQ(d
.bytes_received(), static_cast<int>(file_size
));
8741 // Flaky, see http://crbug.com/25045.
8742 TEST_F(URLRequestTestFTP
, DISABLED_FTPCacheURLCredentials
) {
8743 ASSERT_TRUE(test_server_
.Start());
8745 base::FilePath app_path
;
8746 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8747 app_path
= app_path
.AppendASCII("LICENSE");
8749 scoped_ptr
<TestDelegate
> d(new TestDelegate
);
8751 // Pass correct login identity in the URL.
8752 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8753 test_server_
.GetURLWithUserAndPassword("/LICENSE", "chrome", "chrome"),
8754 DEFAULT_PRIORITY
, d
.get(), NULL
));
8756 EXPECT_TRUE(r
->is_pending());
8758 base::RunLoop().Run();
8760 int64 file_size
= 0;
8761 base::GetFileSize(app_path
, &file_size
);
8763 EXPECT_FALSE(r
->is_pending());
8764 EXPECT_EQ(1, d
->response_started_count());
8765 EXPECT_FALSE(d
->received_data_before_response());
8766 EXPECT_EQ(d
->bytes_received(), static_cast<int>(file_size
));
8769 d
.reset(new TestDelegate
);
8771 // This request should use cached identity from previous request.
8772 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8773 test_server_
.GetURL("/LICENSE"), DEFAULT_PRIORITY
, d
.get(), NULL
));
8775 EXPECT_TRUE(r
->is_pending());
8777 base::RunLoop().Run();
8779 int64 file_size
= 0;
8780 base::GetFileSize(app_path
, &file_size
);
8782 EXPECT_FALSE(r
->is_pending());
8783 EXPECT_EQ(1, d
->response_started_count());
8784 EXPECT_FALSE(d
->received_data_before_response());
8785 EXPECT_EQ(d
->bytes_received(), static_cast<int>(file_size
));
8789 // Flaky, see http://crbug.com/25045.
8790 TEST_F(URLRequestTestFTP
, DISABLED_FTPCacheLoginBoxCredentials
) {
8791 ASSERT_TRUE(test_server_
.Start());
8793 base::FilePath app_path
;
8794 PathService::Get(base::DIR_SOURCE_ROOT
, &app_path
);
8795 app_path
= app_path
.AppendASCII("LICENSE");
8797 scoped_ptr
<TestDelegate
> d(new TestDelegate
);
8798 // Set correct login credentials. The delegate will be asked for them when
8799 // the initial login with wrong credentials will fail.
8800 d
->set_credentials(AuthCredentials(kChrome
, kChrome
));
8802 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8803 test_server_
.GetURLWithUserAndPassword("/LICENSE", "chrome",
8805 DEFAULT_PRIORITY
, d
.get(), NULL
));
8807 EXPECT_TRUE(r
->is_pending());
8809 base::RunLoop().Run();
8811 int64 file_size
= 0;
8812 base::GetFileSize(app_path
, &file_size
);
8814 EXPECT_FALSE(r
->is_pending());
8815 EXPECT_EQ(1, d
->response_started_count());
8816 EXPECT_FALSE(d
->received_data_before_response());
8817 EXPECT_EQ(d
->bytes_received(), static_cast<int>(file_size
));
8820 // Use a new delegate without explicit credentials. The cached ones should be
8822 d
.reset(new TestDelegate
);
8824 // Don't pass wrong credentials in the URL, they would override valid cached
8826 scoped_ptr
<URLRequest
> r(default_context_
.CreateRequest(
8827 test_server_
.GetURL("/LICENSE"), DEFAULT_PRIORITY
, d
.get(), NULL
));
8829 EXPECT_TRUE(r
->is_pending());
8831 base::RunLoop().Run();
8833 int64 file_size
= 0;
8834 base::GetFileSize(app_path
, &file_size
);
8836 EXPECT_FALSE(r
->is_pending());
8837 EXPECT_EQ(1, d
->response_started_count());
8838 EXPECT_FALSE(d
->received_data_before_response());
8839 EXPECT_EQ(d
->bytes_received(), static_cast<int>(file_size
));
8842 #endif // !defined(DISABLE_FTP_SUPPORT)