summaryrefslogtreecommitdiff
path: root/chromium/net/quic/quic_chromium_client_session_test.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/quic/quic_chromium_client_session_test.cc')
-rw-r--r--chromium/net/quic/quic_chromium_client_session_test.cc63
1 files changed, 32 insertions, 31 deletions
diff --git a/chromium/net/quic/quic_chromium_client_session_test.cc b/chromium/net/quic/quic_chromium_client_session_test.cc
index 40ef2277157..58906e65c96 100644
--- a/chromium/net/quic/quic_chromium_client_session_test.cc
+++ b/chromium/net/quic/quic_chromium_client_session_test.cc
@@ -20,6 +20,7 @@
#include "net/base/schemeful_site.h"
#include "net/base/test_completion_callback.h"
#include "net/cert/cert_verify_result.h"
+#include "net/dns/public/secure_dns_policy.h"
#include "net/http/transport_security_state.h"
#include "net/http/transport_security_state_test_util.h"
#include "net/log/net_log_source.h"
@@ -142,7 +143,7 @@ class QuicChromiumClientSessionTest
PRIVACY_MODE_DISABLED,
SocketTag(),
NetworkIsolationKey(),
- false /* disable_secure_dns */),
+ SecureDnsPolicy::kAllow),
destination_(kServerHostname, kServerPort),
default_network_(NetworkChangeNotifier::kInvalidNetworkHandle),
client_maker_(version_,
@@ -1582,39 +1583,39 @@ TEST_P(QuicChromiumClientSessionTest, CanPool) {
EXPECT_TRUE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_ENABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), true /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kDisable)));
#if defined(OS_ANDROID)
SocketTag tag1(SocketTag::UNSET_UID, 0x12345678);
SocketTag tag2(getuid(), 0x87654321);
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, tag1,
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, tag2,
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
#endif
EXPECT_TRUE(session_->CanPool(
"mail.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
EXPECT_TRUE(session_->CanPool(
"mail.example.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"mail.google.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
const SchemefulSite kSiteFoo(GURL("http://foo.test/"));
@@ -1627,7 +1628,7 @@ TEST_P(QuicChromiumClientSessionTest, CanPool) {
"mail.example.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
NetworkIsolationKey(kSiteFoo, kSiteFoo),
- false /* disable_secure_dns */)));
+ SecureDnsPolicy::kAllow)));
}
{
base::test::ScopedFeatureList feature_list;
@@ -1637,7 +1638,7 @@ TEST_P(QuicChromiumClientSessionTest, CanPool) {
"mail.example.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
NetworkIsolationKey(kSiteFoo, kSiteFoo),
- false /* disable_secure_dns */)));
+ SecureDnsPolicy::kAllow)));
}
}
@@ -1656,9 +1657,9 @@ TEST_P(QuicChromiumClientSessionTest, CanPoolExpectCT) {
// Need to create a session key after setting
// kPartitionExpectCTStateByNetworkIsolationKey, otherwise, it will ignore the
// NetworkIsolationKey value.
- session_key_ = QuicSessionKey(
- kServerHostname, kServerPort, PRIVACY_MODE_DISABLED, SocketTag(),
- network_isolation_key, false /* disable_secure_dns */);
+ session_key_ = QuicSessionKey(kServerHostname, kServerPort,
+ PRIVACY_MODE_DISABLED, SocketTag(),
+ network_isolation_key, SecureDnsPolicy::kAllow);
// Need to create this after enabling
// kPartitionExpectCTStateByNetworkIsolationKey.
@@ -1693,7 +1694,7 @@ TEST_P(QuicChromiumClientSessionTest, CanPoolExpectCT) {
EXPECT_TRUE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- network_isolation_key, false /* disable_secure_dns */)));
+ network_isolation_key, SecureDnsPolicy::kAllow)));
// Adding Expect-CT data for different NetworkIsolationKeys should have no
// effect.
@@ -1707,7 +1708,7 @@ TEST_P(QuicChromiumClientSessionTest, CanPoolExpectCT) {
EXPECT_TRUE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- network_isolation_key, false /* disable_secure_dns */)));
+ network_isolation_key, SecureDnsPolicy::kAllow)));
// Adding Expect-CT data for the same NetworkIsolationKey should prevent
// pooling.
@@ -1717,7 +1718,7 @@ TEST_P(QuicChromiumClientSessionTest, CanPoolExpectCT) {
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- network_isolation_key, false /* disable_secure_dns */)));
+ network_isolation_key, SecureDnsPolicy::kAllow)));
}
// Much as above, but uses a non-empty NetworkIsolationKey.
@@ -1731,9 +1732,9 @@ TEST_P(QuicChromiumClientSessionTest, CanPoolWithNetworkIsolationKey) {
const NetworkIsolationKey kNetworkIsolationKey1(kSiteFoo, kSiteFoo);
const NetworkIsolationKey kNetworkIsolationKey2(kSiteBar, kSiteBar);
- session_key_ = QuicSessionKey(
- kServerHostname, kServerPort, PRIVACY_MODE_DISABLED, SocketTag(),
- kNetworkIsolationKey1, false /* disable_secure_dns */);
+ session_key_ = QuicSessionKey(kServerHostname, kServerPort,
+ PRIVACY_MODE_DISABLED, SocketTag(),
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow);
MockQuicData quic_data(version_);
if (VersionUsesHttp3(version_.transport_version))
@@ -1758,44 +1759,44 @@ TEST_P(QuicChromiumClientSessionTest, CanPoolWithNetworkIsolationKey) {
EXPECT_TRUE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- kNetworkIsolationKey1, false /* disable_secure_dns */)));
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_ENABLED, SocketTag(),
- kNetworkIsolationKey1, false /* disable_secure_dns */)));
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow)));
#if defined(OS_ANDROID)
SocketTag tag1(SocketTag::UNSET_UID, 0x12345678);
SocketTag tag2(getuid(), 0x87654321);
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, tag1,
- kNetworkIsolationKey1, false /* disable_secure_dns */)));
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"www.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, tag2,
- kNetworkIsolationKey1, false /* disable_secure_dns */)));
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow)));
#endif
EXPECT_TRUE(session_->CanPool(
"mail.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- kNetworkIsolationKey1, false /* disable_secure_dns */)));
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow)));
EXPECT_TRUE(session_->CanPool(
"mail.example.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- kNetworkIsolationKey1, false /* disable_secure_dns */)));
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"mail.google.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- kNetworkIsolationKey1, false /* disable_secure_dns */)));
+ kNetworkIsolationKey1, SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"mail.example.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- kNetworkIsolationKey2, false /* disable_secure_dns */)));
+ kNetworkIsolationKey2, SecureDnsPolicy::kAllow)));
EXPECT_FALSE(session_->CanPool(
"mail.example.com",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
}
TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) {
@@ -1838,7 +1839,7 @@ TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) {
EXPECT_FALSE(session_->CanPool(
kPreloadedPKPHost,
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
}
TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) {
@@ -1872,7 +1873,7 @@ TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) {
EXPECT_TRUE(session_->CanPool(
"mail.example.org",
QuicSessionKey("foo", 1234, PRIVACY_MODE_DISABLED, SocketTag(),
- NetworkIsolationKey(), false /* disable_secure_dns */)));
+ NetworkIsolationKey(), SecureDnsPolicy::kAllow)));
}
TEST_P(QuicChromiumClientSessionTest, MigrateToSocket) {