summaryrefslogtreecommitdiffstats
path: root/net/base/mock_host_resolver.cc
diff options
context:
space:
mode:
authorericroman@google.com <ericroman@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2009-07-18 08:02:08 +0000
committerericroman@google.com <ericroman@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2009-07-18 08:02:08 +0000
commit40f153572764e76066588fd2e358d05b8fa453bb (patch)
tree9c8bf3de47da4fac879d1035addf2a6780f163e4 /net/base/mock_host_resolver.cc
parenta2c2fb9ff48cd37dbed258dca5b40461c92b71a8 (diff)
downloadchromium_src-40f153572764e76066588fd2e358d05b8fa453bb.zip
chromium_src-40f153572764e76066588fd2e358d05b8fa453bb.tar.gz
chromium_src-40f153572764e76066588fd2e358d05b8fa453bb.tar.bz2
Use manually constructed IPv6 socket addresses for tests, rather than system created ones.
The advantage is that GURL's parsing of IPv6 addresses works on all systems, whereas getaddrinfo(ipv6_literal) only succeeds on IPv6 enabled systems. This allows the tests to run consistently on all systems, including our own WinXP buildbots (which do not support IPv6). BUG=http://crbug.com/16452 TEST=[net_unittests] SOCKS5ClientSocketTest.IPv6Domain, SOCKSClientSocketTest.SOCKS4AIfDomainInIPv6 Review URL: http://codereview.chromium.org/155618 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@21053 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/mock_host_resolver.cc')
-rw-r--r--net/base/mock_host_resolver.cc108
1 files changed, 80 insertions, 28 deletions
diff --git a/net/base/mock_host_resolver.cc b/net/base/mock_host_resolver.cc
index 508ef38..c83f3c8 100644
--- a/net/base/mock_host_resolver.cc
+++ b/net/base/mock_host_resolver.cc
@@ -7,10 +7,36 @@
#include "base/string_util.h"
#include "base/platform_thread.h"
#include "base/ref_counted.h"
+#include "googleurl/src/url_canon_ip.h"
#include "net/base/net_errors.h"
namespace net {
+namespace {
+// Fills |addrlist| with a socket address for |host| which should be an
+// IPv6 literal. Returns OK on success.
+int ResolveIPV6LiteralUsingGURL(const std::string& host,
+ AddressList* addrlist) {
+ // GURL expects the hostname to be surrounded with brackets.
+ std::string host_brackets = "[" + host + "]";
+ url_parse::Component host_comp(0, host_brackets.size());
+
+ // Try parsing the hostname as an IPv6 literal.
+ unsigned char ipv6_addr[16]; // 128 bits.
+ bool ok = url_canon::IPv6AddressToNumber(host_brackets.data(),
+ host_comp,
+ ipv6_addr);
+ if (!ok) {
+ LOG(WARNING) << "Not an IPv6 literal: " << host;
+ return ERR_UNEXPECTED;
+ }
+
+ *addrlist = AddressList::CreateIPv6Address(ipv6_addr);
+ return OK;
+}
+
+} // namespace
+
MockHostResolverBase::MockHostResolverBase(bool use_caching)
: use_caching_(use_caching) {
Reset(NULL);
@@ -71,27 +97,25 @@ void MockHostResolverBase::Reset(HostResolverProc* interceptor) {
//-----------------------------------------------------------------------------
struct RuleBasedHostResolverProc::Rule {
+ enum ResolverType {
+ kResolverTypeFail,
+ kResolverTypeSystem,
+ kResolverTypeIPV6Literal,
+ };
+
+ ResolverType resolver_type;
std::string host_pattern;
std::string replacement;
int latency_ms; // In milliseconds.
- bool direct; // if true, don't mangle hostname and ignore replacement
- Rule(const std::string& host_pattern, const std::string& replacement)
- : host_pattern(host_pattern),
- replacement(replacement),
- latency_ms(0),
- direct(false) {}
- Rule(const std::string& host_pattern, const std::string& replacement,
- const int latency_ms)
- : host_pattern(host_pattern),
- replacement(replacement),
- latency_ms(latency_ms),
- direct(false) {}
- Rule(const std::string& host_pattern, const std::string& replacement,
- const bool direct)
- : host_pattern(host_pattern),
+
+ Rule(ResolverType resolver_type,
+ const std::string& host_pattern,
+ const std::string& replacement,
+ int latency_ms)
+ : resolver_type(resolver_type),
+ host_pattern(host_pattern),
replacement(replacement),
- latency_ms(0),
- direct(direct) {}
+ latency_ms(latency_ms) {}
};
RuleBasedHostResolverProc::RuleBasedHostResolverProc(HostResolverProc* previous)
@@ -103,21 +127,36 @@ RuleBasedHostResolverProc::~RuleBasedHostResolverProc() {
void RuleBasedHostResolverProc::AddRule(const std::string& host_pattern,
const std::string& replacement) {
- rules_.push_back(Rule(host_pattern, replacement));
+ DCHECK(!replacement.empty());
+ Rule rule(Rule::kResolverTypeSystem, host_pattern, replacement, 0);
+ rules_.push_back(rule);
+}
+
+void RuleBasedHostResolverProc::AddIPv6Rule(const std::string& host_pattern,
+ const std::string& ipv6_literal) {
+ Rule rule(Rule::kResolverTypeIPV6Literal, host_pattern, ipv6_literal, 0);
+ rules_.push_back(rule);
}
void RuleBasedHostResolverProc::AddRuleWithLatency(
const std::string& host_pattern,
- const std::string& replacement, int latency_ms) {
- rules_.push_back(Rule(host_pattern, replacement, latency_ms));
+ const std::string& replacement,
+ int latency_ms) {
+ DCHECK(!replacement.empty());
+ Rule rule(Rule::kResolverTypeSystem, host_pattern, replacement, latency_ms);
+ rules_.push_back(rule);
}
-void RuleBasedHostResolverProc::AllowDirectLookup(const std::string& host) {
- rules_.push_back(Rule(host, "", true));
+void RuleBasedHostResolverProc::AllowDirectLookup(
+ const std::string& host_pattern) {
+ Rule rule(Rule::kResolverTypeSystem, host_pattern, "", 0);
+ rules_.push_back(rule);
}
-void RuleBasedHostResolverProc::AddSimulatedFailure(const std::string& host) {
- AddRule(host, "");
+void RuleBasedHostResolverProc::AddSimulatedFailure(
+ const std::string& host_pattern) {
+ Rule rule(Rule::kResolverTypeFail, host_pattern, "", 0);
+ rules_.push_back(rule);
}
int RuleBasedHostResolverProc::Resolve(const std::string& host,
@@ -130,10 +169,23 @@ int RuleBasedHostResolverProc::Resolve(const std::string& host,
// Hmm, this seems unecessary.
r->latency_ms = 1;
}
- const std::string& effective_host = r->direct ? host : r->replacement;
- if (effective_host.empty())
- return ERR_NAME_NOT_RESOLVED;
- return SystemHostResolverProc(effective_host, addrlist);
+
+ // Remap to a new host.
+ const std::string& effective_host =
+ r->replacement.empty() ? host : r->replacement;
+
+ // Apply the resolving function to the remapped hostname.
+ switch (r->resolver_type) {
+ case Rule::kResolverTypeFail:
+ return ERR_NAME_NOT_RESOLVED;
+ case Rule::kResolverTypeSystem:
+ return SystemHostResolverProc(effective_host, addrlist);
+ case Rule::kResolverTypeIPV6Literal:
+ return ResolveIPV6LiteralUsingGURL(effective_host, addrlist);
+ default:
+ NOTREACHED();
+ return ERR_UNEXPECTED;
+ }
}
}
return ResolveUsingPrevious(host, addrlist);