blob: c1f28f7cabe25797ec7832b2697ff962fe82aee3 [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/http/http_response_info.h"
#include "base/pickle.h"
#include "net/cert/signed_certificate_timestamp.h"
#include "net/cert/signed_certificate_timestamp_and_status.h"
#include "net/http/http_response_headers.h"
#include "net/test/ct_test_util.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace net {
namespace {
class HttpResponseInfoTest : public testing::Test {
protected:
void SetUp() override {
response_info_.headers = new HttpResponseHeaders("");
}
void PickleAndRestore(const HttpResponseInfo& response_info,
HttpResponseInfo* restored_response_info) const {
base::Pickle pickle;
response_info.Persist(&pickle, false, false);
bool truncated = false;
restored_response_info->InitFromPickle(pickle, &truncated);
}
HttpResponseInfo response_info_;
};
TEST_F(HttpResponseInfoTest, UnusedSincePrefetchDefault) {
EXPECT_FALSE(response_info_.unused_since_prefetch);
}
TEST_F(HttpResponseInfoTest, UnusedSincePrefetchCopy) {
response_info_.unused_since_prefetch = true;
HttpResponseInfo response_info_clone(response_info_);
EXPECT_TRUE(response_info_clone.unused_since_prefetch);
}
TEST_F(HttpResponseInfoTest, UnusedSincePrefetchPersistFalse) {
HttpResponseInfo restored_response_info;
PickleAndRestore(response_info_, &restored_response_info);
EXPECT_FALSE(restored_response_info.unused_since_prefetch);
}
TEST_F(HttpResponseInfoTest, UnusedSincePrefetchPersistTrue) {
response_info_.unused_since_prefetch = true;
HttpResponseInfo restored_response_info;
PickleAndRestore(response_info_, &restored_response_info);
EXPECT_TRUE(restored_response_info.unused_since_prefetch);
}
TEST_F(HttpResponseInfoTest, PKPBypassPersistTrue) {
response_info_.ssl_info.pkp_bypassed = true;
HttpResponseInfo restored_response_info;
PickleAndRestore(response_info_, &restored_response_info);
EXPECT_TRUE(restored_response_info.ssl_info.pkp_bypassed);
}
TEST_F(HttpResponseInfoTest, PKPBypassPersistFalse) {
response_info_.ssl_info.pkp_bypassed = false;
HttpResponseInfo restored_response_info;
PickleAndRestore(response_info_, &restored_response_info);
EXPECT_FALSE(restored_response_info.ssl_info.pkp_bypassed);
}
TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredDefault) {
EXPECT_FALSE(response_info_.async_revalidation_required);
}
TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredCopy) {
response_info_.async_revalidation_required = true;
net::HttpResponseInfo response_info_clone(response_info_);
EXPECT_TRUE(response_info_clone.async_revalidation_required);
}
TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredAssign) {
response_info_.async_revalidation_required = true;
net::HttpResponseInfo response_info_clone;
response_info_clone = response_info_;
EXPECT_TRUE(response_info_clone.async_revalidation_required);
}
TEST_F(HttpResponseInfoTest, AsyncRevalidationRequiredNotPersisted) {
response_info_.async_revalidation_required = true;
net::HttpResponseInfo restored_response_info;
PickleAndRestore(response_info_, &restored_response_info);
EXPECT_FALSE(restored_response_info.async_revalidation_required);
}
TEST_F(HttpResponseInfoTest, FailsInitFromPickleWithInvalidSCTStatus) {
// A valid certificate is needed for ssl_info.is_valid() to be true
// so that the SCTs would be serialized.
const std::string der_test_cert(net::ct::GetDerEncodedX509Cert());
response_info_.ssl_info.cert = net::X509Certificate::CreateFromBytes(
der_test_cert.data(), der_test_cert.length());
scoped_refptr<ct::SignedCertificateTimestamp> sct;
ct::GetX509CertSCT(&sct);
response_info_.ssl_info.signed_certificate_timestamps.push_back(
SignedCertificateTimestampAndStatus(
sct, ct::SCTVerifyStatus::SCT_STATUS_LOG_UNKNOWN));
base::Pickle pickle;
response_info_.Persist(&pickle, false, false);
bool truncated = false;
net::HttpResponseInfo restored_response_info;
EXPECT_TRUE(restored_response_info.InitFromPickle(pickle, &truncated));
response_info_.ssl_info.signed_certificate_timestamps.push_back(
SignedCertificateTimestampAndStatus(sct,
static_cast<ct::SCTVerifyStatus>(2)));
base::Pickle pickle_invalid;
response_info_.Persist(&pickle_invalid, false, false);
net::HttpResponseInfo restored_invalid_response;
EXPECT_FALSE(
restored_invalid_response.InitFromPickle(pickle_invalid, &truncated));
}
} // namespace
} // namespace net