| Index: net/base/sdch_filter_unittest.cc
|
| diff --git a/net/base/sdch_filter_unittest.cc b/net/base/sdch_filter_unittest.cc
|
| index 675a135cd56872f4f0e8898cf2309b305793638f..ccf07cb497f1d6334496061ae3580c580ad320ef 100644
|
| --- a/net/base/sdch_filter_unittest.cc
|
| +++ b/net/base/sdch_filter_unittest.cc
|
| @@ -17,8 +17,8 @@
|
| #include "base/logging.h"
|
| #include "base/scoped_ptr.h"
|
| #include "net/base/filter.h"
|
| -#include "net/base/filter_unittest.h"
|
| #include "net/base/io_buffer.h"
|
| +#include "net/base/mock_filter_context.h"
|
| #include "net/base/sdch_filter.h"
|
| #include "net/url_request/url_request_http_job.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| @@ -158,7 +158,7 @@ TEST_F(SdchFilterTest, EmptyInputOk) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
| const int kInputBufferSize(30);
|
| char output_buffer[20];
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| std::string url_string("http://ignore.com");
|
| filter_context.SetURL(GURL(url_string));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
| @@ -179,7 +179,7 @@ TEST_F(SdchFilterTest, PassThroughWhenTentative) {
|
| filter_types.push_back(Filter::FILTER_TYPE_GZIP_HELPING_SDCH);
|
| const int kInputBufferSize(30);
|
| char output_buffer[20];
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| // Response code needs to be 200 to allow a pass through.
|
| filter_context.SetResponseCode(200);
|
| std::string url_string("http://ignore.com");
|
| @@ -219,7 +219,7 @@ TEST_F(SdchFilterTest, RefreshBadReturnCode) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH_POSSIBLE);
|
| const int kInputBufferSize(30);
|
| char output_buffer[20];
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| // Response code needs to be 200 to allow a pass through.
|
| filter_context.SetResponseCode(403);
|
| // Meta refresh will only appear for html content
|
| @@ -262,7 +262,7 @@ TEST_F(SdchFilterTest, ErrorOnBadReturnCode) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH_POSSIBLE);
|
| const int kInputBufferSize(30);
|
| char output_buffer[20];
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| // Response code needs to be 200 to allow a pass through.
|
| filter_context.SetResponseCode(403);
|
| // Meta refresh will only appear for html content, so set to something else
|
| @@ -301,7 +301,7 @@ TEST_F(SdchFilterTest, ErrorOnBadReturnCodeWithHtml) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH_POSSIBLE);
|
| const int kInputBufferSize(30);
|
| char output_buffer[20];
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| // Response code needs to be 200 to allow a pass through.
|
| filter_context.SetResponseCode(403);
|
| // Meta refresh will only appear for html content
|
| @@ -344,7 +344,7 @@ TEST_F(SdchFilterTest, BasicBadDictionary) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
| const int kInputBufferSize(30);
|
| char output_buffer[20];
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| std::string url_string("http://ignore.com");
|
| filter_context.SetURL(GURL(url_string));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
| @@ -432,7 +432,7 @@ TEST_F(SdchFilterTest, BasicDictionary) {
|
|
|
| // Decode with a large buffer (larger than test input, or compressed data).
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(url);
|
|
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
| @@ -471,7 +471,7 @@ TEST_F(SdchFilterTest, NoDecodeHttps) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL("https://" + kSampleDomain));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
|
|
| @@ -503,7 +503,7 @@ TEST_F(SdchFilterTest, NoDecodeFtp) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL("ftp://" + kSampleDomain));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
|
|
| @@ -531,7 +531,7 @@ TEST_F(SdchFilterTest, NoDecodeFileColon) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL("file://" + kSampleDomain));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
|
|
| @@ -559,7 +559,7 @@ TEST_F(SdchFilterTest, NoDecodeAboutColon) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL("about://" + kSampleDomain));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
|
|
| @@ -587,7 +587,7 @@ TEST_F(SdchFilterTest, NoDecodeJavaScript) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL("javascript://" + kSampleDomain));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
|
|
| @@ -615,7 +615,7 @@ TEST_F(SdchFilterTest, CanStillDecodeHttp) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL("http://" + kSampleDomain));
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
|
|
| @@ -645,7 +645,7 @@ TEST_F(SdchFilterTest, CrossDomainDictionaryUse) {
|
|
|
| // Decode with content arriving from the "wrong" domain.
|
| // This tests SdchManager::CanSet().
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| GURL wrong_domain_url("http://www.wrongdomain.com");
|
| filter_context.SetURL(wrong_domain_url);
|
| scoped_ptr<Filter> filter((Filter::Factory(filter_types, filter_context)));
|
| @@ -686,7 +686,7 @@ TEST_F(SdchFilterTest, DictionaryPathValidation) {
|
| const int kInputBufferSize(100);
|
|
|
| // Test decode the path data, arriving from a valid path.
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL(url_string + path));
|
| scoped_ptr<Filter> filter((Filter::Factory(filter_types, filter_context)));
|
|
|
| @@ -740,7 +740,7 @@ TEST_F(SdchFilterTest, DictionaryPortValidation) {
|
| const int kInputBufferSize(100);
|
|
|
| // Test decode the port data, arriving from a valid port.
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetURL(GURL(url_string + ":" + port));
|
| scoped_ptr<Filter> filter((Filter::Factory(filter_types, filter_context)));
|
|
|
| @@ -863,7 +863,7 @@ TEST_F(SdchFilterTest, FilterChaining) {
|
| CHECK_GT(kLargeInputBufferSize, gzip_compressed_sdch.size());
|
| CHECK_GT(kLargeInputBufferSize, sdch_compressed.size());
|
| CHECK_GT(kLargeInputBufferSize, expanded_.size());
|
| - MockFilterContext filter_context(kLargeInputBufferSize);
|
| + net::MockFilterContext filter_context(kLargeInputBufferSize);
|
| filter_context.SetURL(url);
|
| scoped_ptr<Filter> filter(Filter::Factory(filter_types, filter_context));
|
|
|
| @@ -933,7 +933,7 @@ TEST_F(SdchFilterTest, DefaultGzipIfSdch) {
|
| filter_types.push_back(Filter::FILTER_TYPE_SDCH);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetMimeType("anything/mime");
|
| filter_context.SetSdchResponse(true);
|
| Filter::FixupEncodingTypes(filter_context, &filter_types);
|
| @@ -993,7 +993,7 @@ TEST_F(SdchFilterTest, AcceptGzipSdchIfGzip) {
|
| filter_types.push_back(Filter::FILTER_TYPE_GZIP);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetMimeType("anything/mime");
|
| filter_context.SetSdchResponse(true);
|
| Filter::FixupEncodingTypes(filter_context, &filter_types);
|
| @@ -1052,7 +1052,7 @@ TEST_F(SdchFilterTest, DefaultSdchGzipIfEmpty) {
|
| std::vector<Filter::FilterType> filter_types;
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetMimeType("anything/mime");
|
| filter_context.SetSdchResponse(true);
|
| Filter::FixupEncodingTypes(filter_context, &filter_types);
|
| @@ -1115,7 +1115,7 @@ TEST_F(SdchFilterTest, AcceptGzipGzipSdchIfGzip) {
|
| filter_types.push_back(Filter::FILTER_TYPE_GZIP);
|
|
|
| const int kInputBufferSize(100);
|
| - MockFilterContext filter_context(kInputBufferSize);
|
| + net::MockFilterContext filter_context(kInputBufferSize);
|
| filter_context.SetMimeType("anything/mime");
|
| filter_context.SetSdchResponse(true);
|
| Filter::FixupEncodingTypes(filter_context, &filter_types);
|
|
|