28e2075280
trunk/talk git-svn-id: http://webrtc.googlecode.com/svn/trunk@4318 4adac7df-926f-26a2-2b94-8c16560cd09d
183 lines
6.6 KiB
C++
183 lines
6.6 KiB
C++
/*
|
|
* libjingle
|
|
* Copyright 2010, Google Inc.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
* this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
* and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
|
* EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
|
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
|
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
|
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <string>
|
|
|
|
#include "talk/base/fileutils_mock.h"
|
|
#include "talk/base/proxydetect.h"
|
|
|
|
namespace talk_base {
|
|
|
|
static const std::string kFirefoxProfilesIni =
|
|
"[Profile0]\n"
|
|
"Name=default\n"
|
|
"IsRelative=1\n"
|
|
"Path=Profiles/2de53ejb.default\n"
|
|
"Default=1\n";
|
|
|
|
static const std::string kFirefoxHeader =
|
|
"# Mozilla User Preferences\n"
|
|
"\n"
|
|
"/* Some Comments\n"
|
|
"*\n"
|
|
"*/\n"
|
|
"\n";
|
|
|
|
static const std::string kFirefoxCorruptHeader =
|
|
"iuahueqe32164";
|
|
|
|
static const std::string kProxyAddress = "proxy.net.com";
|
|
static const int kProxyPort = 9999;
|
|
|
|
// Mocking out platform specific path to firefox prefs file.
|
|
class FirefoxPrefsFileSystem : public FakeFileSystem {
|
|
public:
|
|
explicit FirefoxPrefsFileSystem(const std::vector<File>& all_files) :
|
|
FakeFileSystem(all_files) {
|
|
}
|
|
virtual FileStream* OpenFile(const Pathname& filename,
|
|
const std::string& mode) {
|
|
// TODO: We could have a platform dependent check of paths here.
|
|
std::string name = filename.basename();
|
|
name.append(filename.extension());
|
|
EXPECT_TRUE(name.compare("prefs.js") == 0 ||
|
|
name.compare("profiles.ini") == 0);
|
|
FileStream* stream = FakeFileSystem::OpenFile(name, mode);
|
|
return stream;
|
|
}
|
|
};
|
|
|
|
class ProxyDetectTest : public testing::Test {
|
|
};
|
|
|
|
bool GetProxyInfo(const std::string prefs, ProxyInfo* info) {
|
|
std::vector<talk_base::FakeFileSystem::File> files;
|
|
files.push_back(talk_base::FakeFileSystem::File("profiles.ini",
|
|
kFirefoxProfilesIni));
|
|
files.push_back(talk_base::FakeFileSystem::File("prefs.js", prefs));
|
|
talk_base::FilesystemScope fs(new talk_base::FirefoxPrefsFileSystem(files));
|
|
return GetProxySettingsForUrl("Firefox", "www.google.com", info, false);
|
|
}
|
|
|
|
// Verifies that an empty Firefox prefs file results in no proxy detected.
|
|
TEST_F(ProxyDetectTest, DISABLED_TestFirefoxEmptyPrefs) {
|
|
ProxyInfo proxy_info;
|
|
EXPECT_TRUE(GetProxyInfo(kFirefoxHeader, &proxy_info));
|
|
EXPECT_EQ(PROXY_NONE, proxy_info.type);
|
|
}
|
|
|
|
// Verifies that corrupted prefs file results in no proxy detected.
|
|
TEST_F(ProxyDetectTest, DISABLED_TestFirefoxCorruptedPrefs) {
|
|
ProxyInfo proxy_info;
|
|
EXPECT_TRUE(GetProxyInfo(kFirefoxCorruptHeader, &proxy_info));
|
|
EXPECT_EQ(PROXY_NONE, proxy_info.type);
|
|
}
|
|
|
|
// Verifies that SOCKS5 proxy is detected if configured. SOCKS uses a
|
|
// handshake protocol to inform the proxy software about the
|
|
// connection that the client is trying to make and may be used for
|
|
// any form of TCP or UDP socket connection.
|
|
TEST_F(ProxyDetectTest, DISABLED_TestFirefoxProxySocks) {
|
|
ProxyInfo proxy_info;
|
|
SocketAddress proxy_address("proxy.socks.com", 6666);
|
|
std::string prefs(kFirefoxHeader);
|
|
prefs.append("user_pref(\"network.proxy.socks\", \"proxy.socks.com\");\n");
|
|
prefs.append("user_pref(\"network.proxy.socks_port\", 6666);\n");
|
|
prefs.append("user_pref(\"network.proxy.type\", 1);\n");
|
|
|
|
EXPECT_TRUE(GetProxyInfo(prefs, &proxy_info));
|
|
|
|
EXPECT_EQ(PROXY_SOCKS5, proxy_info.type);
|
|
EXPECT_EQ(proxy_address, proxy_info.address);
|
|
}
|
|
|
|
// Verified that SSL proxy is detected if configured. SSL proxy is an
|
|
// extention of a HTTP proxy to support secure connections.
|
|
TEST_F(ProxyDetectTest, DISABLED_TestFirefoxProxySsl) {
|
|
ProxyInfo proxy_info;
|
|
SocketAddress proxy_address("proxy.ssl.com", 7777);
|
|
std::string prefs(kFirefoxHeader);
|
|
|
|
prefs.append("user_pref(\"network.proxy.ssl\", \"proxy.ssl.com\");\n");
|
|
prefs.append("user_pref(\"network.proxy.ssl_port\", 7777);\n");
|
|
prefs.append("user_pref(\"network.proxy.type\", 1);\n");
|
|
|
|
EXPECT_TRUE(GetProxyInfo(prefs, &proxy_info));
|
|
|
|
EXPECT_EQ(PROXY_HTTPS, proxy_info.type);
|
|
EXPECT_EQ(proxy_address, proxy_info.address);
|
|
}
|
|
|
|
// Verifies that a HTTP proxy is detected if configured.
|
|
TEST_F(ProxyDetectTest, DISABLED_TestFirefoxProxyHttp) {
|
|
ProxyInfo proxy_info;
|
|
SocketAddress proxy_address("proxy.http.com", 8888);
|
|
std::string prefs(kFirefoxHeader);
|
|
|
|
prefs.append("user_pref(\"network.proxy.http\", \"proxy.http.com\");\n");
|
|
prefs.append("user_pref(\"network.proxy.http_port\", 8888);\n");
|
|
prefs.append("user_pref(\"network.proxy.type\", 1);\n");
|
|
|
|
EXPECT_TRUE(GetProxyInfo(prefs, &proxy_info));
|
|
|
|
EXPECT_EQ(PROXY_HTTPS, proxy_info.type);
|
|
EXPECT_EQ(proxy_address, proxy_info.address);
|
|
}
|
|
|
|
// Verifies detection of automatic proxy detection.
|
|
TEST_F(ProxyDetectTest, DISABLED_TestFirefoxProxyAuto) {
|
|
ProxyInfo proxy_info;
|
|
std::string prefs(kFirefoxHeader);
|
|
|
|
prefs.append("user_pref(\"network.proxy.type\", 4);\n");
|
|
|
|
EXPECT_TRUE(GetProxyInfo(prefs, &proxy_info));
|
|
|
|
EXPECT_EQ(PROXY_NONE, proxy_info.type);
|
|
EXPECT_TRUE(proxy_info.autodetect);
|
|
EXPECT_TRUE(proxy_info.autoconfig_url.empty());
|
|
}
|
|
|
|
// Verifies detection of automatic proxy detection using a static url
|
|
// to config file.
|
|
TEST_F(ProxyDetectTest, DISABLED_TestFirefoxProxyAutoUrl) {
|
|
ProxyInfo proxy_info;
|
|
std::string prefs(kFirefoxHeader);
|
|
|
|
prefs.append(
|
|
"user_pref(\"network.proxy.autoconfig_url\", \"http://a/b.pac\");\n");
|
|
prefs.append("user_pref(\"network.proxy.type\", 2);\n");
|
|
|
|
EXPECT_TRUE(GetProxyInfo(prefs, &proxy_info));
|
|
|
|
EXPECT_FALSE(proxy_info.autodetect);
|
|
EXPECT_EQ(PROXY_NONE, proxy_info.type);
|
|
EXPECT_EQ(0, proxy_info.autoconfig_url.compare("http://a/b.pac"));
|
|
}
|
|
|
|
} // namespace talk_base
|