diff options
Diffstat (limited to 'jingle/glue/proxy_resolving_client_socket_unittest.cc')
-rw-r--r-- | jingle/glue/proxy_resolving_client_socket_unittest.cc | 117 |
1 files changed, 117 insertions, 0 deletions
diff --git a/jingle/glue/proxy_resolving_client_socket_unittest.cc b/jingle/glue/proxy_resolving_client_socket_unittest.cc new file mode 100644 index 0000000..49d95f5 --- /dev/null +++ b/jingle/glue/proxy_resolving_client_socket_unittest.cc @@ -0,0 +1,117 @@ +// Copyright (c) 2012 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "jingle/glue/proxy_resolving_client_socket.h" + +#include "base/basictypes.h" +#include "base/compiler_specific.h" +#include "base/message_loop.h" +#include "net/base/mock_host_resolver.h" +#include "net/base/test_completion_callback.h" +#include "net/proxy/proxy_service.h" +#include "net/socket/socket_test_util.h" +#include "net/url_request/url_request_context_getter.h" +#include "net/url_request/url_request_test_util.h" +#include "testing/gtest/include/gtest/gtest.h" + +namespace { + +class MyTestURLRequestContext : public TestURLRequestContext { + public: + MyTestURLRequestContext() : TestURLRequestContext(true) { + context_storage_.set_proxy_service( + net::ProxyService::CreateFixedFromPacResult( + "PROXY bad:99; PROXY maybe:80; DIRECT")); + Init(); + } + virtual ~MyTestURLRequestContext() {} +}; + +} // namespace + +namespace jingle_glue { + +class ProxyResolvingClientSocketTest : public testing::Test { + protected: + ProxyResolvingClientSocketTest() + : url_request_context_getter_(new TestURLRequestContextGetter( + base::MessageLoopProxy::current(), + scoped_ptr<TestURLRequestContext>(new MyTestURLRequestContext))) {} + + virtual ~ProxyResolvingClientSocketTest() {} + + virtual void TearDown() { + // Clear out any messages posted by ProxyResolvingClientSocket's + // destructor. + message_loop_.RunAllPending(); + } + + MessageLoop message_loop_; + scoped_refptr<TestURLRequestContextGetter> url_request_context_getter_; +}; + +// TODO(sanjeevr): Fix this test on Linux. +TEST_F(ProxyResolvingClientSocketTest, DISABLED_ConnectError) { + net::HostPortPair dest("0.0.0.0", 0); + ProxyResolvingClientSocket proxy_resolving_socket( + NULL, + url_request_context_getter_, + net::SSLConfig(), + dest); + net::TestCompletionCallback callback; + int status = proxy_resolving_socket.Connect(callback.callback()); + // Connect always returns ERR_IO_PENDING because it is always asynchronous. + EXPECT_EQ(net::ERR_IO_PENDING, status); + status = callback.WaitForResult(); + // ProxyResolvingClientSocket::Connect() will always return an error of + // ERR_ADDRESS_INVALID for a 0 IP address. + EXPECT_EQ(net::ERR_ADDRESS_INVALID, status); +} + +TEST_F(ProxyResolvingClientSocketTest, ReportsBadProxies) { + net::HostPortPair dest("example.com", 443); + net::MockClientSocketFactory socket_factory; + + net::StaticSocketDataProvider socket_data1; + socket_data1.set_connect_data( + net::MockConnect(net::ASYNC, net::ERR_ADDRESS_UNREACHABLE)); + socket_factory.AddSocketDataProvider(&socket_data1); + + net::MockRead reads[] = { + net::MockRead("HTTP/1.1 200 Success\r\n\r\n") + }; + net::MockWrite writes[] = { + net::MockWrite("CONNECT example.com:443 HTTP/1.1\r\n" + "Host: example.com:443\r\n" + "Proxy-Connection: keep-alive\r\n\r\n") + }; + net::StaticSocketDataProvider socket_data2(reads, arraysize(reads), + writes, arraysize(writes)); + socket_data2.set_connect_data(net::MockConnect(net::ASYNC, net::OK)); + socket_factory.AddSocketDataProvider(&socket_data2); + + ProxyResolvingClientSocket proxy_resolving_socket( + &socket_factory, + url_request_context_getter_, + net::SSLConfig(), + dest); + + net::TestCompletionCallback callback; + int status = proxy_resolving_socket.Connect(callback.callback()); + EXPECT_EQ(net::ERR_IO_PENDING, status); + status = callback.WaitForResult(); + EXPECT_EQ(net::OK, status); + + net::URLRequestContext* context = + url_request_context_getter_->GetURLRequestContext(); + const net::ProxyRetryInfoMap& retry_info = + context->proxy_service()->proxy_retry_info(); + + EXPECT_EQ(1u, retry_info.size()); + net::ProxyRetryInfoMap::const_iterator iter = retry_info.find("bad:99"); + EXPECT_TRUE(iter != retry_info.end()); +} + +// TODO(sanjeevr): Add more unit-tests. +} // namespace jingle_glue |