diff options
Diffstat (limited to 'chromium/chrome/browser/net/proxy_browsertest.cc')
-rw-r--r-- | chromium/chrome/browser/net/proxy_browsertest.cc | 302 |
1 files changed, 302 insertions, 0 deletions
diff --git a/chromium/chrome/browser/net/proxy_browsertest.cc b/chromium/chrome/browser/net/proxy_browsertest.cc new file mode 100644 index 00000000000..e1ac8cacc9d --- /dev/null +++ b/chromium/chrome/browser/net/proxy_browsertest.cc @@ -0,0 +1,302 @@ +// Copyright (c) 2012 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "base/bind.h" +#include "base/command_line.h" +#include "base/files/file_path.h" +#include "base/location.h" +#include "base/macros.h" +#include "base/run_loop.h" +#include "base/strings/string_util.h" +#include "base/strings/utf_string_conversions.h" +#include "base/test/bind_test_util.h" +#include "build/build_config.h" +#include "chrome/browser/chrome_notification_types.h" +#include "chrome/browser/net/proxy_test_utils.h" +#include "chrome/browser/profiles/profile.h" +#include "chrome/browser/ui/browser.h" +#include "chrome/browser/ui/login/login_handler.h" +#include "chrome/browser/ui/tabs/tab_strip_model.h" +#include "chrome/common/chrome_paths.h" +#include "chrome/common/chrome_switches.h" +#include "chrome/test/base/in_process_browser_test.h" +#include "chrome/test/base/ui_test_utils.h" +#include "content/public/browser/browser_thread.h" +#include "content/public/browser/notification_details.h" +#include "content/public/browser/notification_source.h" +#include "content/public/browser/storage_partition.h" +#include "content/public/browser/web_contents.h" +#include "content/public/browser/web_contents_observer.h" +#include "content/public/common/content_switches.h" +#include "content/public/test/browser_test_utils.h" +#include "content/public/test/url_loader_interceptor.h" +#include "google_apis/gaia/gaia_urls.h" +#include "net/base/load_flags.h" +#include "net/test/embedded_test_server/embedded_test_server.h" +#include "net/test/embedded_test_server/simple_connection_listener.h" +#include "net/test/spawned_test_server/spawned_test_server.h" +#include "net/test/test_data_directory.h" +#include "net/traffic_annotation/network_traffic_annotation_test_helper.h" +#include "services/network/public/cpp/simple_url_loader.h" +#include "url/gurl.h" + +#if defined(OS_CHROMEOS) +#include "chrome/browser/chromeos/net/dhcp_wpad_url_client.h" +#endif // defined(OS_CHROMEOS) + +namespace { + +// Verify kPACScript is installed as the PAC script. +void VerifyProxyScript(Browser* browser) { + ui_test_utils::NavigateToURL(browser, GURL("http://google.com")); + + // Verify we get the ERR_PROXY_CONNECTION_FAILED screen. + bool result = false; + EXPECT_TRUE(content::ExecuteScriptAndExtractBool( + browser->tab_strip_model()->GetActiveWebContents(), + "var textContent = document.body.textContent;" + "var hasError = textContent.indexOf('ERR_PROXY_CONNECTION_FAILED') >= 0;" + "domAutomationController.send(hasError);", + &result)); + EXPECT_TRUE(result); +} + +// This class observes chrome::NOTIFICATION_AUTH_NEEDED and supplies +// the credential which is required by the test proxy server. +// "foo:bar" is the required username and password for our test proxy server. +class LoginPromptObserver : public content::NotificationObserver { + public: + LoginPromptObserver() : auth_handled_(false) {} + + void Observe(int type, + const content::NotificationSource& source, + const content::NotificationDetails& details) override { + if (type == chrome::NOTIFICATION_AUTH_NEEDED) { + LoginNotificationDetails* login_details = + content::Details<LoginNotificationDetails>(details).ptr(); + // |login_details->handler()| is the associated LoginHandler object. + // SetAuth() will close the login dialog. + login_details->handler()->SetAuth(base::ASCIIToUTF16("foo"), + base::ASCIIToUTF16("bar")); + auth_handled_ = true; + } + } + + bool auth_handled() const { return auth_handled_; } + + private: + bool auth_handled_; + + DISALLOW_COPY_AND_ASSIGN(LoginPromptObserver); +}; + +// Test that the browser can establish a WebSocket connection via a proxy +// that requires basic authentication. This test also checks the headers +// arrive at WebSocket server. +IN_PROC_BROWSER_TEST_F(ProxyBrowserTest, BasicAuthWSConnect) { + // Launch WebSocket server. + net::SpawnedTestServer ws_server(net::SpawnedTestServer::TYPE_WS, + net::GetWebSocketTestDataDirectory()); + ASSERT_TRUE(ws_server.Start()); + + content::WebContents* tab = + browser()->tab_strip_model()->GetActiveWebContents(); + content::NavigationController* controller = &tab->GetController(); + content::NotificationRegistrar registrar; + // The proxy server will request basic authentication. + // |observer| supplies the credential. + LoginPromptObserver observer; + registrar.Add(&observer, chrome::NOTIFICATION_AUTH_NEEDED, + content::Source<content::NavigationController>(controller)); + + content::TitleWatcher watcher(tab, base::ASCIIToUTF16("PASS")); + watcher.AlsoWaitForTitle(base::ASCIIToUTF16("FAIL")); + + // Visit a page that tries to establish WebSocket connection. The title + // of the page will be 'PASS' on success. + GURL::Replacements replacements; + replacements.SetSchemeStr("http"); + ui_test_utils::NavigateToURL(browser(), + ws_server.GetURL("proxied_request_check.html") + .ReplaceComponents(replacements)); + + const base::string16 result = watcher.WaitAndGetTitle(); + EXPECT_TRUE(base::EqualsASCII(result, "PASS")); + EXPECT_TRUE(observer.auth_handled()); +} + +// Fetches a PAC script via an http:// URL, and ensures that requests to +// http://www.google.com fail with ERR_PROXY_CONNECTION_FAILED (by virtue of +// PAC file having selected a non-existent PROXY server). +class BaseHttpProxyScriptBrowserTest : public InProcessBrowserTest { + public: + BaseHttpProxyScriptBrowserTest() { + http_server_.ServeFilesFromSourceDirectory(GetChromeTestDataDir()); + } + ~BaseHttpProxyScriptBrowserTest() override {} + + void SetUp() override { + ASSERT_TRUE(http_server_.Start()); + InProcessBrowserTest::SetUp(); + } + + void SetUpCommandLine(base::CommandLine* command_line) override { + command_line->AppendSwitchASCII( + switches::kProxyPacUrl, + http_server_.GetURL("/" + GetPacFilename()).spec()); + } + + protected: + virtual std::string GetPacFilename() = 0; + net::EmbeddedTestServer http_server_; + + private: + DISALLOW_COPY_AND_ASSIGN(BaseHttpProxyScriptBrowserTest); +}; + +// Tests the use of a PAC script that rejects requests to http://www.google.com/ +class HttpProxyScriptBrowserTest : public BaseHttpProxyScriptBrowserTest { + public: + HttpProxyScriptBrowserTest() = default; + ~HttpProxyScriptBrowserTest() override {} + + std::string GetPacFilename() override { + // PAC script that sends all requests to an invalid proxy server. + return "bad_server.pac"; + } + + private: + DISALLOW_COPY_AND_ASSIGN(HttpProxyScriptBrowserTest); +}; + +IN_PROC_BROWSER_TEST_F(HttpProxyScriptBrowserTest, Verify) { + VerifyProxyScript(browser()); +} + +#if defined(OS_CHROMEOS) +// Tests the use of a PAC script set via Web Proxy Autodiscovery Protocol. +// TODO(crbug.com/991867): Add a test case for when DhcpWpadUrlClient +// returns an empty PAC URL. +class WPADHttpProxyScriptBrowserTest : public HttpProxyScriptBrowserTest { + public: + WPADHttpProxyScriptBrowserTest() = default; + ~WPADHttpProxyScriptBrowserTest() override {} + + void SetUp() override { + ASSERT_TRUE(http_server_.Start()); + pac_url_ = http_server_.GetURL("/" + GetPacFilename()); + chromeos::DhcpWpadUrlClient::SetPacUrlForTesting(pac_url_); + InProcessBrowserTest::SetUp(); + } + + void TearDown() override { + chromeos::DhcpWpadUrlClient::ClearPacUrlForTesting(); + InProcessBrowserTest::TearDown(); + } + + void SetUpCommandLine(base::CommandLine* command_line) override { + command_line->AppendSwitch(switches::kProxyAutoDetect); + } + + private: + GURL pac_url_; + DISALLOW_COPY_AND_ASSIGN(WPADHttpProxyScriptBrowserTest); +}; + +IN_PROC_BROWSER_TEST_F(WPADHttpProxyScriptBrowserTest, Verify) { + VerifyProxyScript(browser()); +} +#endif // defined(OS_CHROMEOS) + +// Tests the use of a PAC script that rejects requests to http://www.google.com/ +// when myIpAddress() and myIpAddressEx() appear to be working. +class MyIpAddressProxyScriptBrowserTest + : public BaseHttpProxyScriptBrowserTest { + public: + MyIpAddressProxyScriptBrowserTest() = default; + ~MyIpAddressProxyScriptBrowserTest() override {} + + std::string GetPacFilename() override { + // PAC script that sends all requests to an invalid proxy server provided + // myIpAddress() and myIpAddressEx() are not loopback addresses. + return "my_ip_address.pac"; + } + + private: + DISALLOW_COPY_AND_ASSIGN(MyIpAddressProxyScriptBrowserTest); +}; + +IN_PROC_BROWSER_TEST_F(MyIpAddressProxyScriptBrowserTest, Verify) { + VerifyProxyScript(browser()); +} + +// Fetch PAC script via a hanging http:// URL. +class HangingPacRequestProxyScriptBrowserTest : public InProcessBrowserTest { + public: + HangingPacRequestProxyScriptBrowserTest() {} + ~HangingPacRequestProxyScriptBrowserTest() override {} + + void SetUp() override { + // Must start listening (And get a port for the proxy) before calling + // SetUp(). + ASSERT_TRUE(embedded_test_server()->InitializeAndListen()); + InProcessBrowserTest::SetUp(); + } + + void TearDown() override { + // Need to stop this before |connection_listener_| is destroyed. + EXPECT_TRUE(embedded_test_server()->ShutdownAndWaitUntilComplete()); + InProcessBrowserTest::TearDown(); + } + + void SetUpOnMainThread() override { + // This must be created after the main message loop has been set up. + // Waits for one connection. Additional connections are fine. + connection_listener_ = + std::make_unique<net::test_server::SimpleConnectionListener>( + 1, net::test_server::SimpleConnectionListener:: + ALLOW_ADDITIONAL_CONNECTIONS); + embedded_test_server()->SetConnectionListener(connection_listener_.get()); + embedded_test_server()->StartAcceptingConnections(); + } + + void SetUpCommandLine(base::CommandLine* command_line) override { + command_line->AppendSwitchASCII( + switches::kProxyPacUrl, embedded_test_server()->GetURL("/hung").spec()); + } + + protected: + std::unique_ptr<net::test_server::SimpleConnectionListener> + connection_listener_; + + private: + DISALLOW_COPY_AND_ASSIGN(HangingPacRequestProxyScriptBrowserTest); +}; + +// Check that the URLRequest for a PAC that is still alive during shutdown is +// safely cleaned up. This test relies on AssertNoURLRequests being called on +// the main URLRequestContext. +IN_PROC_BROWSER_TEST_F(HangingPacRequestProxyScriptBrowserTest, Shutdown) { + // Request that should hang while trying to request the PAC script. + // Enough requests are created on startup that this probably isn't needed, but + // best to be safe. + auto resource_request = std::make_unique<network::ResourceRequest>(); + resource_request->url = GURL("http://blah/"); + auto simple_loader = network::SimpleURLLoader::Create( + std::move(resource_request), TRAFFIC_ANNOTATION_FOR_TESTS); + + auto* storage_partition = + content::BrowserContext::GetDefaultStoragePartition(browser()->profile()); + auto url_loader_factory = + storage_partition->GetURLLoaderFactoryForBrowserProcess(); + simple_loader->DownloadToStringOfUnboundedSizeUntilCrashAndDie( + url_loader_factory.get(), + base::BindOnce([](std::unique_ptr<std::string> body) { + ADD_FAILURE() << "This request should never complete."; + })); + + connection_listener_->WaitForConnections(); +} + +} // namespace |