Index: net/proxy/proxy_resolver_v8_tracing_unittest.cc |
diff --git a/net/proxy/proxy_resolver_v8_tracing_unittest.cc b/net/proxy/proxy_resolver_v8_tracing_unittest.cc |
index 13dfe623f46088e960ab9c70af7213e9c9361679..729493775416729fc41066d029b19a9c8d452c4f 100644 |
--- a/net/proxy/proxy_resolver_v8_tracing_unittest.cc |
+++ b/net/proxy/proxy_resolver_v8_tracing_unittest.cc |
@@ -18,8 +18,10 @@ |
#include "net/base/test_completion_callback.h" |
#include "net/dns/host_cache.h" |
#include "net/dns/mock_host_resolver.h" |
+#include "net/log/captured_net_log_entry.h" |
#include "net/log/net_log.h" |
#include "net/log/net_log_unittest.h" |
+#include "net/log/test_net_log.h" |
#include "net/proxy/proxy_info.h" |
#include "net/proxy/proxy_resolver_error_observer.h" |
#include "testing/gtest/include/gtest/gtest.h" |
@@ -152,12 +154,12 @@ TEST_F(ProxyResolverV8TracingTest, JavascriptError) { |
// Check the NetLogs -- there was 1 alert and 1 javascript error, and they |
// were output to both the global log, and per-request log. |
- TestNetLog::CapturedEntryList entries_list[2]; |
+ CapturedNetLogEntry::List entries_list[2]; |
log.GetEntries(&entries_list[0]); |
request_log.GetEntries(&entries_list[1]); |
for (size_t list_i = 0; list_i < arraysize(entries_list); list_i++) { |
- const TestNetLog::CapturedEntryList& entries = entries_list[list_i]; |
+ const CapturedNetLogEntry::List& entries = entries_list[list_i]; |
EXPECT_EQ(2u, entries.size()); |
EXPECT_TRUE( |
LogContainsEvent(entries, 0, NetLog::TYPE_PAC_JAVASCRIPT_ALERT, |
@@ -206,12 +208,12 @@ TEST_F(ProxyResolverV8TracingTest, TooManyAlerts) { |
// Check the NetLogs -- the script generated 50 alerts, which were mirrored |
// to both the global and per-request logs. |
- TestNetLog::CapturedEntryList entries_list[2]; |
+ CapturedNetLogEntry::List entries_list[2]; |
log.GetEntries(&entries_list[0]); |
request_log.GetEntries(&entries_list[1]); |
for (size_t list_i = 0; list_i < arraysize(entries_list); list_i++) { |
- const TestNetLog::CapturedEntryList& entries = entries_list[list_i]; |
+ const CapturedNetLogEntry::List& entries = entries_list[list_i]; |
EXPECT_EQ(50u, entries.size()); |
for (size_t i = 0; i < entries.size(); ++i) { |
ASSERT_TRUE( |
@@ -254,12 +256,12 @@ TEST_F(ProxyResolverV8TracingTest, TooManyEmptyAlerts) { |
// Check the NetLogs -- the script generated 50 alerts, which were mirrored |
// to both the global and per-request logs. |
- TestNetLog::CapturedEntryList entries_list[2]; |
+ CapturedNetLogEntry::List entries_list[2]; |
log.GetEntries(&entries_list[0]); |
request_log.GetEntries(&entries_list[1]); |
for (size_t list_i = 0; list_i < arraysize(entries_list); list_i++) { |
- const TestNetLog::CapturedEntryList& entries = entries_list[list_i]; |
+ const CapturedNetLogEntry::List& entries = entries_list[list_i]; |
EXPECT_EQ(1000u, entries.size()); |
for (size_t i = 0; i < entries.size(); ++i) { |
ASSERT_TRUE( |
@@ -332,12 +334,12 @@ TEST_F(ProxyResolverV8TracingTest, Dns) { |
// Check the NetLogs -- the script generated 1 alert, mirrored to both |
// the per-request and global logs. |
- TestNetLog::CapturedEntryList entries_list[2]; |
+ CapturedNetLogEntry::List entries_list[2]; |
log.GetEntries(&entries_list[0]); |
request_log.GetEntries(&entries_list[1]); |
for (size_t list_i = 0; list_i < arraysize(entries_list); list_i++) { |
- const TestNetLog::CapturedEntryList& entries = entries_list[list_i]; |
+ const CapturedNetLogEntry::List& entries = entries_list[list_i]; |
EXPECT_EQ(1u, entries.size()); |
EXPECT_TRUE( |
LogContainsEvent(entries, 0, NetLog::TYPE_PAC_JAVASCRIPT_ALERT, |
@@ -441,12 +443,12 @@ TEST_F(ProxyResolverV8TracingTest, FallBackToSynchronous1) { |
// Check the NetLogs -- the script generated 1 alert, mirrored to both |
// the per-request and global logs. |
- TestNetLog::CapturedEntryList entries_list[2]; |
+ CapturedNetLogEntry::List entries_list[2]; |
log.GetEntries(&entries_list[0]); |
request_log.GetEntries(&entries_list[1]); |
for (size_t list_i = 0; list_i < arraysize(entries_list); list_i++) { |
- const TestNetLog::CapturedEntryList& entries = entries_list[list_i]; |
+ const CapturedNetLogEntry::List& entries = entries_list[list_i]; |
EXPECT_EQ(1u, entries.size()); |
EXPECT_TRUE( |
LogContainsEvent(entries, 0, NetLog::TYPE_PAC_JAVASCRIPT_ALERT, |
@@ -614,7 +616,7 @@ void DnsDuringInitHelper(bool synchronous_host_resolver) { |
// Check the NetLogs -- the script generated 2 alerts during initialization. |
EXPECT_EQ(0u, request_log.GetSize()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
ASSERT_EQ(2u, entries.size()); |