Index: chrome/browser/chromeos/proxy_config_service_impl_unittest.cc |
=================================================================== |
--- chrome/browser/chromeos/proxy_config_service_impl_unittest.cc (revision 65413) |
+++ chrome/browser/chromeos/proxy_config_service_impl_unittest.cc (working copy) |
@@ -387,55 +387,42 @@ |
const Input& input = tests[i].input; |
switch (input.mode) { |
case MK_MODE(DIRECT) : |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToDirect()); |
+ config_service()->UISetProxyConfigToDirect(); |
break; |
case MK_MODE(AUTO_DETECT) : |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToAutoDetect()); |
+ config_service()->UISetProxyConfigToAutoDetect(); |
break; |
case MK_MODE(PAC_SCRIPT) : |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToPACScript( |
- GURL(input.pac_url))); |
+ config_service()->UISetProxyConfigToPACScript(GURL(input.pac_url)); |
break; |
case MK_MODE(SINGLE_PROXY) : |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToSingleProxy( |
- net::ProxyServer::FromURI(input.single_uri, |
- MK_SCHM(HTTP)))); |
+ config_service()->UISetProxyConfigToSingleProxy( |
+ net::ProxyServer::FromURI(input.single_uri, MK_SCHM(HTTP))); |
if (input.bypass_rules) { |
bypass_rules.ParseFromStringUsingSuffixMatching(input.bypass_rules); |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigBypassRules( |
- bypass_rules)); |
+ config_service()->UISetProxyConfigBypassRules(bypass_rules); |
} |
break; |
case MK_MODE(PROXY_PER_SCHEME) : |
if (input.http_uri) { |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToProxyPerScheme("http", |
- net::ProxyServer::FromURI(input.http_uri, MK_SCHM(HTTP)))); |
+ config_service()->UISetProxyConfigToProxyPerScheme("http", |
+ net::ProxyServer::FromURI(input.http_uri, MK_SCHM(HTTP))); |
} |
if (input.https_uri) { |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToProxyPerScheme("https", |
- net::ProxyServer::FromURI(input.https_uri, MK_SCHM(HTTPS)))); |
+ config_service()->UISetProxyConfigToProxyPerScheme("https", |
+ net::ProxyServer::FromURI(input.https_uri, MK_SCHM(HTTPS))); |
} |
if (input.ftp_uri) { |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToProxyPerScheme("ftp", |
- net::ProxyServer::FromURI(input.ftp_uri, MK_SCHM(HTTP)))); |
+ config_service()->UISetProxyConfigToProxyPerScheme("ftp", |
+ net::ProxyServer::FromURI(input.ftp_uri, MK_SCHM(HTTP))); |
} |
if (input.socks_uri) { |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigToProxyPerScheme("socks", |
- net::ProxyServer::FromURI(input.socks_uri, MK_SCHM(SOCKS4)))); |
+ config_service()->UISetProxyConfigToProxyPerScheme("socks", |
+ net::ProxyServer::FromURI(input.socks_uri, MK_SCHM(SOCKS4))); |
} |
if (input.bypass_rules) { |
bypass_rules.ParseFromStringUsingSuffixMatching(input.bypass_rules); |
- EXPECT_EQ(tests[i].is_valid, |
- config_service()->UISetProxyConfigBypassRules(bypass_rules)); |
+ config_service()->UISetProxyConfigBypassRules(bypass_rules); |
} |
break; |
} |