proxy_script_decider_unittest.cc revision d0247b1b59f9c528cb6df88b4f2b9afaf80d181e
15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved. 25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be 35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file. 45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <vector> 65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/bind.h" 85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/memory/weak_ptr.h" 9ca12bfac764ba476d6cd062bf1dde12cc64c3f40Ben Murdoch#include "base/message_loop/message_loop.h" 10d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)#include "base/run_loop.h" 115e3f23d412006dc4db4e659864679f29341e113fTorne (Richard Coles)#include "base/strings/string_util.h" 12868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)#include "base/strings/utf_string_conversions.h" 13eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch#include "base/time/time.h" 145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_errors.h" 155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_log.h" 165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/net_log_unittest.h" 175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/base/test_completion_callback.h" 18d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)#include "net/dns/mock_host_resolver.h" 195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/proxy/dhcp_proxy_script_fetcher.h" 205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/proxy/proxy_config.h" 215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/proxy/proxy_resolver.h" 225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/proxy/proxy_script_decider.h" 235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "net/proxy/proxy_script_fetcher.h" 24d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)#include "net/url_request/url_request_context.h" 255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "testing/gtest/include/gtest/gtest.h" 265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace net { 285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace { 295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)enum Error { 315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) kFailedDownloading = -100, 325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) kFailedParsing = ERR_PAC_SCRIPT_FAILED, 335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class Rules { 365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) struct Rule { 385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rule(const GURL& url, int fetch_error, bool is_valid_script) 395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : url(url), 405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) fetch_error(fetch_error), 415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) is_valid_script(is_valid_script) { 425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 44c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) base::string16 text() const { 455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (is_valid_script) 465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return UTF8ToUTF16(url.spec() + "!FindProxyForURL"); 475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (fetch_error == OK) 485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return UTF8ToUTF16(url.spec() + "!invalid-script"); 49c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) return base::string16(); 505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GURL url; 535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) int fetch_error; 545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) bool is_valid_script; 555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) }; 565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rule AddSuccessRule(const char* url) { 585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rule rule(GURL(url), OK /*fetch_error*/, true); 595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules_.push_back(rule); 605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return rule; 615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) void AddFailDownloadRule(const char* url) { 645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules_.push_back(Rule(GURL(url), kFailedDownloading /*fetch_error*/, 655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) false)); 665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) void AddFailParsingRule(const char* url) { 695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules_.push_back(Rule(GURL(url), OK /*fetch_error*/, false)); 705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const Rule& GetRuleByUrl(const GURL& url) const { 735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (RuleList::const_iterator it = rules_.begin(); it != rules_.end(); 745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ++it) { 755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (it->url == url) 765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return *it; 775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(FATAL) << "Rule not found for " << url; 795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return rules_[0]; 805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 82c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) const Rule& GetRuleByText(const base::string16& text) const { 835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) for (RuleList::const_iterator it = rules_.begin(); it != rules_.end(); 845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ++it) { 855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (it->text() == text) 865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return *it; 875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(FATAL) << "Rule not found for " << text; 895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return rules_[0]; 905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) typedef std::vector<Rule> RuleList; 945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleList rules_; 955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class RuleBasedProxyScriptFetcher : public ProxyScriptFetcher { 985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 99d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) explicit RuleBasedProxyScriptFetcher(const Rules* rules) 100d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) : rules_(rules), request_context_(NULL) {} 101d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 102d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) virtual void SetRequestContext(URLRequestContext* context) { 103d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) request_context_ = context; 104d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // ProxyScriptFetcher implementation. 1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) virtual int Fetch(const GURL& url, 108c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) base::string16* text, 1092a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) const CompletionCallback& callback) OVERRIDE { 1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const Rules::Rule& rule = rules_->GetRuleByUrl(url); 1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) int rv = rule.fetch_error; 1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_NE(ERR_UNEXPECTED, rv); 1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (rv == OK) 1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) *text = rule.text(); 1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return rv; 1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1182a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) virtual void Cancel() OVERRIDE {} 1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 120d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) virtual URLRequestContext* GetRequestContext() const OVERRIDE { 121d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return request_context_; 122d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const Rules* rules_; 126d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) URLRequestContext* request_context_; 1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Succeed using custom PAC script. 1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, CustomPacSucceeds) { 1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules::Rule rule = rules.AddSuccessRule("http://custom/proxy.pac"); 1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog log; 1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log); 1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(OK, decider.Start( 1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config, base::TimeDelta(), true, callback.callback())); 1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(rule.text(), decider.script_data()->utf16()); 1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Check the NetLog was filled correctly. 1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog::CapturedEntryList entries; 1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) log.GetEntries(&entries); 1505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(4u, entries.size()); 1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 1535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 1575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 1595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(decider.effective_config().has_pac_url()); 1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(config.pac_url(), decider.effective_config().pac_url()); 1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fail downloading the custom PAC script. 1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, CustomPacFails1) { 1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://custom/proxy.pac"); 1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog log; 1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log); 1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(kFailedDownloading, 1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta(), true, 1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback.callback())); 1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Check the NetLog was filled correctly. 1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog::CapturedEntryList entries; 1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) log.GetEntries(&entries); 1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(4u, entries.size()); 1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_FALSE(decider.effective_config().has_pac_url()); 1995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fail parsing the custom PAC script. 2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, CustomPacFails2) { 2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 2045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailParsingRule("http://custom/proxy.pac"); 2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 2135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL); 2145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(kFailedParsing, 2155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta(), true, 2165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback.callback())); 2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fail downloading the custom PAC script, because the fetcher was NULL. 2215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, HasNullProxyScriptFetcher) { 2225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 2235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 2245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 2265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 2275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 2295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(NULL, &dhcp_fetcher, NULL); 2305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(ERR_UNEXPECTED, 2315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta(), true, 2325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback.callback())); 2335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 2345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Succeeds in choosing autodetect (WPAD DNS). 2375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, AutodetectSuccess) { 2385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 2395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 2405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 2415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 2435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 2445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules::Rule rule = rules.AddSuccessRule("http://wpad/wpad.dat"); 2465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 2485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL); 2495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(OK, decider.Start( 2505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config, base::TimeDelta(), true, callback.callback())); 2515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(rule.text(), decider.script_data()->utf16()); 2525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(decider.effective_config().has_pac_url()); 2545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(rule.url, decider.effective_config().pac_url()); 2555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 257d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)class ProxyScriptDeciderQuickCheckTest : public ::testing::Test { 258d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) public: 259d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ProxyScriptDeciderQuickCheckTest() 260d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) : rule_(rules_.AddSuccessRule("http://wpad/wpad.dat")), 261d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) fetcher_(&rules_) { } 262d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 263d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) virtual void SetUp() OVERRIDE { 264d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) request_context_.set_host_resolver(&resolver_); 265d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) fetcher_.SetRequestContext(&request_context_); 266d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) config_.set_auto_detect(true); 267d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) decider_.reset(new ProxyScriptDecider(&fetcher_, &dhcp_fetcher_, NULL)); 268d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 269d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 270d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) int StartDecider() { 271d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) return decider_->Start(config_, base::TimeDelta(), true, 272d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) callback_.callback()); 273d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) } 274d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 275d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) protected: 276d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) scoped_ptr<ProxyScriptDecider> decider_; 277d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) MockHostResolver resolver_; 278d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) Rules rules_; 279d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) Rules::Rule rule_; 280d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) TestCompletionCallback callback_; 281d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 282d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) private: 283d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) URLRequestContext request_context_; 284d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 285d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) RuleBasedProxyScriptFetcher fetcher_; 286d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher_; 287d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 288d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ProxyConfig config_; 289d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)}; 290d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 291d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Fails if a synchronous DNS lookup success for wpad causes QuickCheck to fail. 292d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)TEST_F(ProxyScriptDeciderQuickCheckTest, SyncSuccess) { 293d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.set_synchronous_mode(true); 294d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.rules()->AddRule("wpad", "1.2.3.4"); 295d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 296d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(OK, StartDecider()); 297d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(rule_.text(), decider_->script_data()->utf16()); 298d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 299d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_TRUE(decider_->effective_config().has_pac_url()); 300d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(rule_.url, decider_->effective_config().pac_url()); 301d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)} 302d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 303d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Fails if an asynchronous DNS lookup success for wpad causes QuickCheck to 304d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// fail. 305d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)TEST_F(ProxyScriptDeciderQuickCheckTest, AsyncSuccess) { 306d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.set_ondemand_mode(true); 307d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.rules()->AddRule("wpad", "1.2.3.4"); 308d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 309d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(ERR_IO_PENDING, StartDecider()); 310d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ASSERT_TRUE(resolver_.has_pending_requests()); 311d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.ResolveAllPending(); 312d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) callback_.WaitForResult(); 313d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_FALSE(resolver_.has_pending_requests()); 314d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(rule_.text(), decider_->script_data()->utf16()); 315d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_TRUE(decider_->effective_config().has_pac_url()); 316d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(rule_.url, decider_->effective_config().pac_url()); 317d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)} 318d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 319d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Fails if an asynchronous DNS lookup failure (i.e. an NXDOMAIN) still causes 320d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// ProxyScriptDecider to yield a PAC URL. 321d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)TEST_F(ProxyScriptDeciderQuickCheckTest, AsyncFail) { 322d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.set_ondemand_mode(true); 323d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.rules()->AddSimulatedFailure("wpad"); 324d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(ERR_IO_PENDING, StartDecider()); 325d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ASSERT_TRUE(resolver_.has_pending_requests()); 326d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.ResolveAllPending(); 327d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) callback_.WaitForResult(); 328d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_FALSE(decider_->effective_config().has_pac_url()); 329d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)} 330d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 331d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// Fails if a DNS lookup timeout either causes ProxyScriptDecider to yield a PAC 332d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)// URL or causes ProxyScriptDecider not to cancel its pending resolution. 333d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)TEST_F(ProxyScriptDeciderQuickCheckTest, AsyncTimeout) { 334d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) resolver_.set_ondemand_mode(true); 335d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_EQ(ERR_IO_PENDING, StartDecider()); 336d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) ASSERT_TRUE(resolver_.has_pending_requests()); 337d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) callback_.WaitForResult(); 338d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_FALSE(resolver_.has_pending_requests()); 339d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) EXPECT_FALSE(decider_->effective_config().has_pac_url()); 340d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles)} 341d0247b1b59f9c528cb6df88b4f2b9afaf80d181eTorne (Richard Coles) 3425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fails at WPAD (downloading), but succeeds in choosing the custom PAC. 3435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess1) { 3445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 3455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 3465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 3475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 3495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 3505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 3515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://wpad/wpad.dat"); 3535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules::Rule rule = rules.AddSuccessRule("http://custom/proxy.pac"); 3545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 3565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL); 3575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(OK, decider.Start( 3585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config, base::TimeDelta(), true, callback.callback())); 3595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(rule.text(), decider.script_data()->utf16()); 3605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(decider.effective_config().has_pac_url()); 3625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(rule.url, decider.effective_config().pac_url()); 3635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 3645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fails at WPAD (no DHCP config, DNS PAC fails parsing), but succeeds in 3665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// choosing the custom PAC. 3675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess2) { 3685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 3695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 3705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 3715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 3735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 3745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 3755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.proxy_rules().ParseFromString("unused-manual-proxy:99"); 3765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailParsingRule("http://wpad/wpad.dat"); 3785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules::Rule rule = rules.AddSuccessRule("http://custom/proxy.pac"); 3795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 3815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog log; 3825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log); 3845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(OK, decider.Start(config, base::TimeDelta(), 3855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) true, callback.callback())); 3865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(rule.text(), decider.script_data()->utf16()); 3875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Verify that the effective configuration no longer contains auto detect or 3895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // any of the manual settings. 3905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(decider.effective_config().Equals( 3915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig::CreateFromCustomPacURL(GURL("http://custom/proxy.pac")))); 3925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Check the NetLog was filled correctly. 3945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // (Note that various states are repeated since both WPAD and custom 3955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // PAC scripts are tried). 3965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog::CapturedEntryList entries; 3975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) log.GetEntries(&entries); 3985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 3995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(10u, entries.size()); 4005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 4015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 4025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // This is the DHCP phase, which fails fetching rather than parsing, so 4035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // there is no pair of SET_PAC_SCRIPT events. 4045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 4055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 4065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 4075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 4085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEvent( 4095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 3, 4105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetLog::TYPE_PROXY_SCRIPT_DECIDER_FALLING_BACK_TO_NEXT_PAC_SOURCE, 4115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetLog::PHASE_NONE)); 4125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // This is the DNS phase, which attempts a fetch but fails. 4135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 4145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 4, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 4155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 4165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 5, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 4175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEvent( 4185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 6, 4195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetLog::TYPE_PROXY_SCRIPT_DECIDER_FALLING_BACK_TO_NEXT_PAC_SOURCE, 4205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NetLog::PHASE_NONE)); 4215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Finally, the custom PAC URL phase. 4225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 4235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 7, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 4245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 4255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 8, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 4265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 4275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 9, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 4285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 4295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fails at WPAD (downloading), and fails at custom PAC (downloading). 4315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, AutodetectFailCustomFails1) { 4325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 4335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 4345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 4355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 4375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 4385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 4395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://wpad/wpad.dat"); 4415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://custom/proxy.pac"); 4425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 4445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL); 4455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(kFailedDownloading, 4465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta(), true, 4475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback.callback())); 4485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 4495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 4505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Fails at WPAD (downloading), and fails at custom PAC (parsing). 4525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, AutodetectFailCustomFails2) { 4535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 4545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 4555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 4565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 4585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 4595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 4605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://wpad/wpad.dat"); 4625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailParsingRule("http://custom/proxy.pac"); 4635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 4655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL); 4665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(kFailedParsing, 4675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta(), true, 4685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback.callback())); 4695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 4705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 4715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// This is a copy-paste of CustomPacFails1, with the exception that we give it 4735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// a 1 millisecond delay. This means it will now complete asynchronously. 4745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Moreover, we test the NetLog to make sure it logged the pause. 4755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, CustomPacFails1_WithPositiveDelay) { 4765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 4775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 4785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 4795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 4815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 4825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://custom/proxy.pac"); 4845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 4865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog log; 4875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log); 4885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(ERR_IO_PENDING, 4895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta::FromMilliseconds(1), 4905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) true, callback.callback())); 4915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(kFailedDownloading, callback.WaitForResult()); 4935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 4945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Check the NetLog was filled correctly. 4965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog::CapturedEntryList entries; 4975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) log.GetEntries(&entries); 4985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 4995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(6u, entries.size()); 5005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 5015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 5025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 5035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_WAIT)); 5045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 5055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_WAIT)); 5065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 5075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 5085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 5095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 4, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 5105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 5115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 5, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 5125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 5135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// This is a copy-paste of CustomPacFails1, with the exception that we give it 5155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// a -5 second delay instead of a 0 ms delay. This change should have no effect 5165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// so the rest of the test is unchanged. 5175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, CustomPacFails1_WithNegativeDelay) { 5185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 5195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 5205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DoNothingDhcpProxyScriptFetcher dhcp_fetcher; 5215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 5235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_pac_url(GURL("http://custom/proxy.pac")); 5245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://custom/proxy.pac"); 5265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 5285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog log; 5295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log); 5305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(kFailedDownloading, 5315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta::FromSeconds(-5), 5325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) true, callback.callback())); 5335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 5345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Check the NetLog was filled correctly. 5365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CapturingNetLog::CapturedEntryList entries; 5375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) log.GetEntries(&entries); 5385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(4u, entries.size()); 5405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 5415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 5425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsBeginEvent( 5435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 5445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 5455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT)); 5465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(LogContainsEndEvent( 5475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER)); 5485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 5495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class SynchronousSuccessDhcpFetcher : public DhcpProxyScriptFetcher { 5515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 552c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) explicit SynchronousSuccessDhcpFetcher(const base::string16& expected_text) 5535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : gurl_("http://dhcppac/"), expected_text_(expected_text) { 5545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 556c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) virtual int Fetch(base::string16* utf16_text, 5572a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) const CompletionCallback& callback) OVERRIDE { 5585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) *utf16_text = expected_text_; 5595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return OK; 5605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5622a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) virtual void Cancel() OVERRIDE { 5635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5652a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) virtual const GURL& GetPacURL() const OVERRIDE { 5665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return gurl_; 5675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 569c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) const base::string16& expected_text() const { 5705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return expected_text_; 5715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 5725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 5745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GURL gurl_; 575c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) base::string16 expected_text_; 5765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DISALLOW_COPY_AND_ASSIGN(SynchronousSuccessDhcpFetcher); 5785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 5795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// All of the tests above that use ProxyScriptDecider have tested 5815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// failure to fetch a PAC file via DHCP configuration, so we now test 5825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// success at downloading and parsing, and then success at downloading, 5835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// failure at parsing. 5845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, AutodetectDhcpSuccess) { 5865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 5875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 5885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) SynchronousSuccessDhcpFetcher dhcp_fetcher( 5895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) WideToUTF16(L"http://bingo/!FindProxyForURL")); 5905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 5925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 5935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddSuccessRule("http://bingo/"); 5955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://wpad/wpad.dat"); 5965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 5975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 5985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL); 5995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(OK, decider.Start( 6005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config, base::TimeDelta(), true, callback.callback())); 6015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(dhcp_fetcher.expected_text(), 6025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.script_data()->utf16()); 6035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_TRUE(decider.effective_config().has_pac_url()); 6055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(GURL("http://dhcppac/"), decider.effective_config().pac_url()); 6065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 6075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, AutodetectDhcpFailParse) { 6095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 6105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 6115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) SynchronousSuccessDhcpFetcher dhcp_fetcher( 6125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) WideToUTF16(L"http://bingo/!invalid-script")); 6135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 6155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 6165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailParsingRule("http://bingo/"); 6185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://wpad/wpad.dat"); 6195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 6215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL); 6225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Since there is fallback to DNS-based WPAD, the final error will be that 6235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // it failed downloading, not that it failed parsing. 6245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(kFailedDownloading, 6255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta(), true, callback.callback())); 6265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_EQ(NULL, decider.script_data()); 6275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) EXPECT_FALSE(decider.effective_config().has_pac_url()); 6295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 6305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)class AsyncFailDhcpFetcher 6325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : public DhcpProxyScriptFetcher, 6335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public base::SupportsWeakPtr<AsyncFailDhcpFetcher> { 6345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) public: 6355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) AsyncFailDhcpFetcher() {} 6362a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) virtual ~AsyncFailDhcpFetcher() {} 6375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 638c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) virtual int Fetch(base::string16* utf16_text, 6392a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) const CompletionCallback& callback) OVERRIDE { 6405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback_ = callback; 64190dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles) base::MessageLoop::current()->PostTask( 6425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) FROM_HERE, 6435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::Bind(&AsyncFailDhcpFetcher::CallbackWithFailure, AsWeakPtr())); 6445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return ERR_IO_PENDING; 6455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6472a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) virtual void Cancel() OVERRIDE { 6485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback_.Reset(); 6495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6512a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) virtual const GURL& GetPacURL() const OVERRIDE { 6525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return dummy_gurl_; 6535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) void CallbackWithFailure() { 6565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!callback_.is_null()) 6575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) callback_.Run(ERR_PAC_NOT_IN_DHCP); 6585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) private: 6615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GURL dummy_gurl_; 6625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CompletionCallback callback_; 6635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}; 6645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TEST(ProxyScriptDeciderTest, DhcpCancelledByDestructor) { 6665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // This regression test would crash before 6675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // http://codereview.chromium.org/7044058/ 6685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Thus, we don't care much about actual results (hence no EXPECT or ASSERT 6695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // macros below), just that it doesn't crash. 6705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Rules rules; 6715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) RuleBasedProxyScriptFetcher fetcher(&rules); 6725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) scoped_ptr<AsyncFailDhcpFetcher> dhcp_fetcher(new AsyncFailDhcpFetcher()); 6745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyConfig config; 6765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) config.set_auto_detect(true); 6775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) rules.AddFailDownloadRule("http://wpad/wpad.dat"); 6785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) TestCompletionCallback callback; 6805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Scope so ProxyScriptDecider gets destroyed early. 6825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) { 6835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProxyScriptDecider decider(&fetcher, dhcp_fetcher.get(), NULL); 6845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) decider.Start(config, base::TimeDelta(), true, callback.callback()); 6855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 6865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Run the message loop to let the DHCP fetch complete and post the results 6885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // back. Before the fix linked to above, this would try to invoke on 6895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // the callback object provided by ProxyScriptDecider after it was 6905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // no longer valid. 69190dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles) base::MessageLoop::current()->RunUntilIdle(); 6925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 6935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 6945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace 6955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace net 696