| // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/http/http_auth_handler_mock.h" |
| |
| #include "base/bind.h" |
| #include "base/message_loop.h" |
| #include "base/string_util.h" |
| #include "net/base/net_errors.h" |
| #include "net/http/http_request_info.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| |
| namespace net { |
| |
| HttpAuthHandlerMock::HttpAuthHandlerMock() |
| : resolve_(RESOLVE_INIT), |
| ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)), |
| generate_async_(false), |
| generate_rv_(OK), |
| auth_token_(NULL), |
| first_round_(true), |
| connection_based_(false), |
| allows_default_credentials_(false), |
| allows_explicit_credentials_(true) { |
| } |
| |
| HttpAuthHandlerMock::~HttpAuthHandlerMock() { |
| } |
| |
| void HttpAuthHandlerMock::SetResolveExpectation(Resolve resolve) { |
| EXPECT_EQ(RESOLVE_INIT, resolve_); |
| resolve_ = resolve; |
| } |
| |
| bool HttpAuthHandlerMock::NeedsCanonicalName() { |
| switch (resolve_) { |
| case RESOLVE_SYNC: |
| case RESOLVE_ASYNC: |
| return true; |
| case RESOLVE_SKIP: |
| resolve_ = RESOLVE_TESTED; |
| return false; |
| default: |
| NOTREACHED(); |
| return false; |
| } |
| } |
| |
| int HttpAuthHandlerMock::ResolveCanonicalName( |
| HostResolver* host_resolver, const CompletionCallback& callback) { |
| EXPECT_NE(RESOLVE_TESTED, resolve_); |
| int rv = OK; |
| switch (resolve_) { |
| case RESOLVE_SYNC: |
| resolve_ = RESOLVE_TESTED; |
| break; |
| case RESOLVE_ASYNC: |
| EXPECT_TRUE(callback_.is_null()); |
| rv = ERR_IO_PENDING; |
| callback_ = callback; |
| MessageLoop::current()->PostTask( |
| FROM_HERE, base::Bind( |
| &HttpAuthHandlerMock::OnResolveCanonicalName, |
| weak_factory_.GetWeakPtr())); |
| break; |
| default: |
| NOTREACHED(); |
| break; |
| } |
| return rv; |
| } |
| |
| void HttpAuthHandlerMock::SetGenerateExpectation(bool async, int rv) { |
| generate_async_ = async; |
| generate_rv_ = rv; |
| } |
| |
| HttpAuth::AuthorizationResult HttpAuthHandlerMock::HandleAnotherChallenge( |
| HttpAuth::ChallengeTokenizer* challenge) { |
| // If we receive an empty challenge for a connection based scheme, or a second |
| // challenge for a non connection based scheme, assume it's a rejection. |
| if (!is_connection_based() || challenge->base64_param().empty()) |
| return HttpAuth::AUTHORIZATION_RESULT_REJECT; |
| if (!LowerCaseEqualsASCII(challenge->scheme(), "mock")) |
| return HttpAuth::AUTHORIZATION_RESULT_INVALID; |
| return HttpAuth::AUTHORIZATION_RESULT_ACCEPT; |
| } |
| |
| bool HttpAuthHandlerMock::NeedsIdentity() { |
| return first_round_; |
| } |
| |
| bool HttpAuthHandlerMock::AllowsDefaultCredentials() { |
| return allows_default_credentials_; |
| } |
| |
| bool HttpAuthHandlerMock::AllowsExplicitCredentials() { |
| return allows_explicit_credentials_; |
| } |
| |
| bool HttpAuthHandlerMock::Init(HttpAuth::ChallengeTokenizer* challenge) { |
| auth_scheme_ = HttpAuth::AUTH_SCHEME_MOCK; |
| score_ = 1; |
| properties_ = connection_based_ ? IS_CONNECTION_BASED : 0; |
| return true; |
| } |
| |
| int HttpAuthHandlerMock::GenerateAuthTokenImpl( |
| const AuthCredentials* credentials, |
| const HttpRequestInfo* request, |
| const CompletionCallback& callback, |
| std::string* auth_token) { |
| first_round_ = false; |
| request_url_ = request->url; |
| if (generate_async_) { |
| EXPECT_TRUE(callback_.is_null()); |
| EXPECT_TRUE(auth_token_ == NULL); |
| callback_ = callback; |
| auth_token_ = auth_token; |
| MessageLoop::current()->PostTask( |
| FROM_HERE, base::Bind( |
| &HttpAuthHandlerMock::OnGenerateAuthToken, |
| weak_factory_.GetWeakPtr())); |
| return ERR_IO_PENDING; |
| } else { |
| if (generate_rv_ == OK) |
| *auth_token = "auth_token"; |
| return generate_rv_; |
| } |
| } |
| |
| void HttpAuthHandlerMock::OnResolveCanonicalName() { |
| EXPECT_EQ(RESOLVE_ASYNC, resolve_); |
| EXPECT_TRUE(!callback_.is_null()); |
| resolve_ = RESOLVE_TESTED; |
| CompletionCallback callback = callback_; |
| callback_.Reset(); |
| callback.Run(OK); |
| } |
| |
| void HttpAuthHandlerMock::OnGenerateAuthToken() { |
| EXPECT_TRUE(generate_async_); |
| EXPECT_TRUE(!callback_.is_null()); |
| if (generate_rv_ == OK) |
| *auth_token_ = "auth_token"; |
| auth_token_ = NULL; |
| CompletionCallback callback = callback_; |
| callback_.Reset(); |
| callback.Run(generate_rv_); |
| } |
| |
| HttpAuthHandlerMock::Factory::Factory() |
| : do_init_from_challenge_(false) { |
| // TODO(cbentzel): Default do_init_from_challenge_ to true. |
| } |
| |
| HttpAuthHandlerMock::Factory::~Factory() { |
| } |
| |
| void HttpAuthHandlerMock::Factory::AddMockHandler( |
| HttpAuthHandler* handler, HttpAuth::Target target) { |
| handlers_[target].push_back(handler); |
| } |
| |
| int HttpAuthHandlerMock::Factory::CreateAuthHandler( |
| HttpAuth::ChallengeTokenizer* challenge, |
| HttpAuth::Target target, |
| const GURL& origin, |
| CreateReason reason, |
| int nonce_count, |
| const BoundNetLog& net_log, |
| scoped_ptr<HttpAuthHandler>* handler) { |
| if (handlers_[target].empty()) |
| return ERR_UNEXPECTED; |
| scoped_ptr<HttpAuthHandler> tmp_handler(handlers_[target][0]); |
| std::vector<HttpAuthHandler*>& handlers = handlers_[target].get(); |
| handlers.erase(handlers.begin()); |
| if (do_init_from_challenge_ && |
| !tmp_handler->InitFromChallenge(challenge, target, origin, net_log)) |
| return ERR_INVALID_RESPONSE; |
| handler->swap(tmp_handler); |
| return OK; |
| } |
| |
| } // namespace net |