diff options
author | Neil Fuller <nfuller@google.com> | 2015-08-04 07:56:48 +0000 |
---|---|---|
committer | Gerrit Code Review <noreply-gerritcodereview@google.com> | 2015-08-04 07:56:48 +0000 |
commit | 34d183b404333627266d568e905a60e2be3a06f3 (patch) | |
tree | 36068939f978f3081095b62b5d4ba0257facf0c1 | |
parent | 23fe202d2e3c85b7245648360211aa22547ea355 (diff) | |
parent | 11c3934f61c6c873fd9caae16947285bc0068965 (diff) | |
download | libcore-34d183b404333627266d568e905a60e2be3a06f3.zip libcore-34d183b404333627266d568e905a60e2be3a06f3.tar.gz libcore-34d183b404333627266d568e905a60e2be3a06f3.tar.bz2 |
Merge "Revert "Changes associated with an OkHttp bad proxy response fix"" into lollipop-cts-dev
-rw-r--r-- | luni/src/test/java/libcore/java/net/URLConnectionTest.java | 26 |
1 files changed, 18 insertions, 8 deletions
diff --git a/luni/src/test/java/libcore/java/net/URLConnectionTest.java b/luni/src/test/java/libcore/java/net/URLConnectionTest.java index b672b19..f438d1b 100644 --- a/luni/src/test/java/libcore/java/net/URLConnectionTest.java +++ b/luni/src/test/java/libcore/java/net/URLConnectionTest.java @@ -641,32 +641,42 @@ public final class URLConnectionTest extends AbstractResourceLeakageDetectorTest * Tolerate bad https proxy response when using HttpResponseCache. http://b/6754912 */ public void testConnectViaHttpProxyToHttpsUsingBadProxyAndHttpResponseCache() throws Exception { + ProxyConfig proxyConfig = ProxyConfig.PROXY_SYSTEM_PROPERTY; + TestSSLContext testSSLContext = TestSSLContext.create(); initResponseCache(); server.useHttps(testSSLContext.serverContext.getSocketFactory(), true); - - // The inclusion of a body in the response to the CONNECT is key to reproducing b/6754912. MockResponse badProxyResponse = new MockResponse() .setSocketPolicy(SocketPolicy.UPGRADE_TO_SSL_AT_END) .clearHeaders() - .setBody("bogus proxy connect response content"); + .setBody("bogus proxy connect response content"); // Key to reproducing b/6754912 + // We enqueue the bad response twice because the connection will + // be retried with TLS_MODE_COMPATIBLE after the first connection + // fails. + server.enqueue(badProxyResponse); server.enqueue(badProxyResponse); - server.enqueue(new MockResponse().setBody("response")); server.play(); URL url = new URL("https://android.com/foo"); - ProxyConfig proxyConfig = ProxyConfig.PROXY_SYSTEM_PROPERTY; HttpsURLConnection connection = (HttpsURLConnection) proxyConfig.connect(server, url); connection.setSSLSocketFactory(testSSLContext.clientContext.getSocketFactory()); - connection.setHostnameVerifier(new RecordingHostnameVerifier()); - assertContent("response", connection); + + try { + connection.connect(); + fail(); + } catch (SSLHandshakeException expected) { + // Thrown when the connect causes SSLSocket.startHandshake() to throw + // when it sees the "bogus proxy connect response content" + // instead of a ServerHello handshake message. + } RecordedRequest connect = server.takeRequest(); - assertEquals("CONNECT android.com:443 HTTP/1.1", connect.getRequestLine()); + assertEquals("Connect line failure on proxy", + "CONNECT android.com:443 HTTP/1.1", connect.getRequestLine()); assertContains(connect.getHeaders(), "Host: android.com"); } |