# Copyright 2014 The Chromium Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. import base64 import unittest from metrics import chrome_proxy from metrics import network_unittest from metrics import test_page_measurement_results # Timeline events used in tests. # An HTML not via proxy. EVENT_HTML_PROXY = network_unittest.NetworkMetricTest.MakeNetworkTimelineEvent( url='http://test.html1', response_headers={ 'Content-Type': 'text/html', 'Content-Length': str(len(network_unittest.HTML_BODY)), }, body=network_unittest.HTML_BODY) # An HTML via proxy with the deprecated Via header. EVENT_HTML_PROXY_DEPRECATED_VIA = ( network_unittest.NetworkMetricTest.MakeNetworkTimelineEvent( url='http://test.html2', response_headers={ 'Content-Type': 'text/html', 'Content-Encoding': 'gzip', 'X-Original-Content-Length': str(len(network_unittest.HTML_BODY)), 'Via': (chrome_proxy.CHROME_PROXY_VIA_HEADER_DEPRECATED + ',other-via'), }, body=network_unittest.HTML_BODY)) # An image via proxy with Via header and it is cached. EVENT_IMAGE_PROXY_CACHED = ( network_unittest.NetworkMetricTest.MakeNetworkTimelineEvent( url='http://test.image', response_headers={ 'Content-Type': 'image/jpeg', 'Content-Encoding': 'gzip', 'X-Original-Content-Length': str(network_unittest.IMAGE_OCL), 'Via': '1.1 ' + chrome_proxy.CHROME_PROXY_VIA_HEADER, }, body=base64.b64encode(network_unittest.IMAGE_BODY), base64_encoded_body=True, served_from_cache=True)) # An image fetched directly. EVENT_IMAGE_DIRECT = ( network_unittest.NetworkMetricTest.MakeNetworkTimelineEvent( url='http://test.image', response_headers={ 'Content-Type': 'image/jpeg', 'Content-Encoding': 'gzip', }, body=base64.b64encode(network_unittest.IMAGE_BODY), base64_encoded_body=True)) # A safe-browsing malware response. EVENT_MALWARE_PROXY = ( network_unittest.NetworkMetricTest.MakeNetworkTimelineEvent( url='http://test.malware', response_headers={ 'X-Malware-Url': '1', 'Via': '1.1 ' + chrome_proxy.CHROME_PROXY_VIA_HEADER, 'Location': 'http://test.malware', }, status=307)) class ChromeProxyMetricTest(unittest.TestCase): _test_proxy_info = {} def _StubGetProxyInfo(self, info): def stub(unused_tab, unused_url=''): # pylint: disable=W0613 return ChromeProxyMetricTest._test_proxy_info chrome_proxy.GetProxyInfoFromNetworkInternals = stub ChromeProxyMetricTest._test_proxy_info = info def testChromeProxyResponse(self): # An https non-proxy response. resp = chrome_proxy.ChromeProxyResponse( network_unittest.NetworkMetricTest.MakeNetworkTimelineEvent( url='https://test.url', response_headers={ 'Content-Type': 'text/html', 'Content-Length': str(len(network_unittest.HTML_BODY)), 'Via': 'some other via', }, body=network_unittest.HTML_BODY)) self.assertFalse(resp.ShouldHaveChromeProxyViaHeader()) self.assertFalse(resp.HasChromeProxyViaHeader()) self.assertTrue(resp.IsValidByViaHeader()) # A proxied JPEG image response resp = chrome_proxy.ChromeProxyResponse( network_unittest.NetworkMetricTest.MakeNetworkTimelineEvent( url='http://test.image', response_headers={ 'Content-Type': 'image/jpeg', 'Content-Encoding': 'gzip', 'Via': '1.1 ' + chrome_proxy.CHROME_PROXY_VIA_HEADER, 'X-Original-Content-Length': str(network_unittest.IMAGE_OCL), }, body=base64.b64encode(network_unittest.IMAGE_BODY), base64_encoded_body=True)) self.assertTrue(resp.ShouldHaveChromeProxyViaHeader()) self.assertTrue(resp.HasChromeProxyViaHeader()) self.assertTrue(resp.IsValidByViaHeader()) def testChromeProxyMetricForDataSaving(self): metric = chrome_proxy.ChromeProxyMetric() events = [ EVENT_HTML_PROXY, EVENT_HTML_PROXY_DEPRECATED_VIA, EVENT_IMAGE_PROXY_CACHED, EVENT_IMAGE_DIRECT] metric.SetEvents(events) self.assertTrue(len(events), len(list(metric.IterResponses(None)))) results = test_page_measurement_results.TestPageMeasurementResults(self) metric.AddResultsForDataSaving(None, results) results.AssertHasPageSpecificScalarValue('resources_via_proxy', 'count', 2) results.AssertHasPageSpecificScalarValue('resources_from_cache', 'count', 1) results.AssertHasPageSpecificScalarValue('resources_direct', 'count', 2) def testChromeProxyMetricForHeaderValidation(self): metric = chrome_proxy.ChromeProxyMetric() metric.SetEvents([ EVENT_HTML_PROXY, EVENT_HTML_PROXY_DEPRECATED_VIA, EVENT_IMAGE_PROXY_CACHED, EVENT_IMAGE_DIRECT]) results = test_page_measurement_results.TestPageMeasurementResults(self) missing_via_exception = False try: metric.AddResultsForHeaderValidation(None, results) except chrome_proxy.ChromeProxyMetricException: missing_via_exception = True # Only the HTTP image response does not have a valid Via header. self.assertTrue(missing_via_exception) # Two events with valid Via headers. metric.SetEvents([ EVENT_HTML_PROXY_DEPRECATED_VIA, EVENT_IMAGE_PROXY_CACHED]) metric.AddResultsForHeaderValidation(None, results) results.AssertHasPageSpecificScalarValue('checked_via_header', 'count', 2) def testChromeProxyMetricForBypass(self): metric = chrome_proxy.ChromeProxyMetric() metric.SetEvents([ EVENT_HTML_PROXY, EVENT_HTML_PROXY_DEPRECATED_VIA, EVENT_IMAGE_PROXY_CACHED, EVENT_IMAGE_DIRECT]) results = test_page_measurement_results.TestPageMeasurementResults(self) bypass_exception = False try: metric.AddResultsForBypass(None, results) except chrome_proxy.ChromeProxyMetricException: bypass_exception = True # Two of the first three events have Via headers. self.assertTrue(bypass_exception) # Use directly fetched image only. It is treated as bypassed. metric.SetEvents([EVENT_IMAGE_DIRECT]) metric.AddResultsForBypass(None, results) results.AssertHasPageSpecificScalarValue('bypass', 'count', 1) def testChromeProxyMetricForHTTPFallback(self): metric = chrome_proxy.ChromeProxyMetric() metric.SetEvents([ EVENT_HTML_PROXY, EVENT_HTML_PROXY_DEPRECATED_VIA]) results = test_page_measurement_results.TestPageMeasurementResults(self) fallback_exception = False info = {} info['enabled'] = False self._StubGetProxyInfo(info) try: metric.AddResultsForBypass(None, results) except chrome_proxy.ChromeProxyMetricException: fallback_exception = True self.assertTrue(fallback_exception) fallback_exception = False info['enabled'] = True info['proxies'] = [ 'something.else.com:80', chrome_proxy.PROXY_SETTING_DIRECT ] self._StubGetProxyInfo(info) try: metric.AddResultsForBypass(None, results) except chrome_proxy.ChromeProxyMetricException: fallback_exception = True self.assertTrue(fallback_exception) info['enabled'] = True info['proxies'] = [ chrome_proxy.PROXY_SETTING_HTTP, chrome_proxy.PROXY_SETTING_DIRECT ] self._StubGetProxyInfo(info) metric.AddResultsForHTTPFallback(None, results) def testChromeProxyMetricForSafebrowsing(self): metric = chrome_proxy.ChromeProxyMetric() metric.SetEvents([EVENT_MALWARE_PROXY]) results = test_page_measurement_results.TestPageMeasurementResults(self) metric.AddResultsForSafebrowsing(None, results) results.AssertHasPageSpecificScalarValue('safebrowsing', 'boolean', True) # Clear results and metrics to test no response for safebrowsing results = test_page_measurement_results.TestPageMeasurementResults(self) metric.SetEvents([]) metric.AddResultsForSafebrowsing(None, results) results.AssertHasPageSpecificScalarValue('safebrowsing', 'boolean', True)