| Index: chrome/browser/privacy_blacklist/blacklist_unittest.cc
|
| diff --git a/chrome/browser/privacy_blacklist/blacklist_unittest.cc b/chrome/browser/privacy_blacklist/blacklist_unittest.cc
|
| index f979aaff44265150aadc7fc84dd673e592d5d95e..2331319bba249eeb350d38b1f5259fc3ed62e758 100644
|
| --- a/chrome/browser/privacy_blacklist/blacklist_unittest.cc
|
| +++ b/chrome/browser/privacy_blacklist/blacklist_unittest.cc
|
| @@ -8,6 +8,7 @@
|
| #include "base/file_util.h"
|
| #include "base/path_service.h"
|
| #include "base/string_util.h"
|
| +#include "chrome/browser/privacy_blacklist/blacklist_io.h"
|
| #include "chrome/common/chrome_paths.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| @@ -17,47 +18,51 @@ TEST(BlacklistTest, Generic) {
|
| PathService::Get(chrome::DIR_TEST_DATA, &input);
|
| input = input.AppendASCII("blacklist_small.pbr");
|
|
|
| - Blacklist blacklist(input);
|
| + Blacklist blacklist;
|
| + ASSERT_TRUE(BlacklistIO::ReadBinary(&blacklist, input));
|
| +
|
| + Blacklist::EntryList entries(blacklist.entries_begin(),
|
| + blacklist.entries_end());
|
|
|
| - // This test is a friend, so inspect the internal structures.
|
| - EXPECT_EQ(5U, blacklist.blacklist_.size());
|
| - std::vector<Blacklist::Entry*>::const_iterator i =
|
| - blacklist.blacklist_.begin();
|
| + ASSERT_EQ(5U, entries.size());
|
|
|
| EXPECT_EQ(Blacklist::kBlockByType|Blacklist::kDontPersistCookies,
|
| - (*i)->attributes());
|
| - EXPECT_TRUE((*i)->MatchType("application/x-shockwave-flash"));
|
| - EXPECT_FALSE((*i)->MatchType("image/jpeg"));
|
| - EXPECT_EQ("@", (*i++)->pattern());
|
| + entries[0]->attributes());
|
| + EXPECT_TRUE(entries[0]->MatchesType("application/x-shockwave-flash"));
|
| + EXPECT_FALSE(entries[0]->MatchesType("image/jpeg"));
|
| + EXPECT_EQ("@", entries[0]->pattern());
|
|
|
| // All entries include global attributes.
|
| // NOTE: Silly bitwise-or with zero to workaround a Mac compiler bug.
|
| - EXPECT_EQ(Blacklist::kBlockUnsecure|0, (*i)->attributes());
|
| - EXPECT_FALSE((*i)->MatchType("application/x-shockwave-flash"));
|
| - EXPECT_FALSE((*i)->MatchType("image/jpeg"));
|
| - EXPECT_EQ("@poor-security-site.com", (*i++)->pattern());
|
| + EXPECT_EQ(Blacklist::kBlockUnsecure|0, entries[1]->attributes());
|
| + EXPECT_FALSE(entries[1]->MatchesType("application/x-shockwave-flash"));
|
| + EXPECT_FALSE(entries[1]->MatchesType("image/jpeg"));
|
| + EXPECT_EQ("@poor-security-site.com", entries[1]->pattern());
|
|
|
| EXPECT_EQ(Blacklist::kDontSendCookies|Blacklist::kDontStoreCookies,
|
| - (*i)->attributes());
|
| - EXPECT_FALSE((*i)->MatchType("application/x-shockwave-flash"));
|
| - EXPECT_FALSE((*i)->MatchType("image/jpeg"));
|
| - EXPECT_EQ("@.ad-serving-place.com", (*i++)->pattern());
|
| + entries[2]->attributes());
|
| + EXPECT_FALSE(entries[2]->MatchesType("application/x-shockwave-flash"));
|
| + EXPECT_FALSE(entries[2]->MatchesType("image/jpeg"));
|
| + EXPECT_EQ("@.ad-serving-place.com", entries[2]->pattern());
|
|
|
| EXPECT_EQ(Blacklist::kDontSendUserAgent|Blacklist::kDontSendReferrer,
|
| - (*i)->attributes());
|
| - EXPECT_FALSE((*i)->MatchType("application/x-shockwave-flash"));
|
| - EXPECT_FALSE((*i)->MatchType("image/jpeg"));
|
| - EXPECT_EQ("www.site.com/anonymous/folder/@", (*i++)->pattern());
|
| + entries[3]->attributes());
|
| + EXPECT_FALSE(entries[3]->MatchesType("application/x-shockwave-flash"));
|
| + EXPECT_FALSE(entries[3]->MatchesType("image/jpeg"));
|
| + EXPECT_EQ("www.site.com/anonymous/folder/@", entries[3]->pattern());
|
|
|
| // NOTE: Silly bitwise-or with zero to workaround a Mac compiler bug.
|
| - EXPECT_EQ(Blacklist::kBlockAll|0, (*i)->attributes());
|
| - EXPECT_FALSE((*i)->MatchType("application/x-shockwave-flash"));
|
| - EXPECT_FALSE((*i)->MatchType("image/jpeg"));
|
| - EXPECT_EQ("www.site.com/bad/url", (*i++)->pattern());
|
| -
|
| - EXPECT_EQ(1U, blacklist.providers_.size());
|
| - EXPECT_EQ("Sample", blacklist.providers_.front()->name());
|
| - EXPECT_EQ("http://www.google.com", blacklist.providers_.front()->url());
|
| + EXPECT_EQ(Blacklist::kBlockAll|0, entries[4]->attributes());
|
| + EXPECT_FALSE(entries[4]->MatchesType("application/x-shockwave-flash"));
|
| + EXPECT_FALSE(entries[4]->MatchesType("image/jpeg"));
|
| + EXPECT_EQ("www.site.com/bad/url", entries[4]->pattern());
|
| +
|
| + Blacklist::ProviderList providers(blacklist.providers_begin(),
|
| + blacklist.providers_end());
|
| +
|
| + ASSERT_EQ(1U, providers.size());
|
| + EXPECT_EQ("Sample", providers[0]->name());
|
| + EXPECT_EQ("http://www.google.com", providers[0]->url());
|
|
|
| // No match for chrome, about or empty URLs.
|
| EXPECT_FALSE(blacklist.findMatch(GURL()));
|
|
|