| OLD | NEW |
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/http/url_security_manager.h" | 5 #include "net/http/url_security_manager.h" |
| 6 | 6 |
| 7 #include <utility> |
| 8 |
| 7 #include "net/base/net_errors.h" | 9 #include "net/base/net_errors.h" |
| 8 #include "net/http/http_auth_filter.h" | 10 #include "net/http/http_auth_filter.h" |
| 9 #include "testing/gtest/include/gtest/gtest.h" | 11 #include "testing/gtest/include/gtest/gtest.h" |
| 10 #include "url/gurl.h" | 12 #include "url/gurl.h" |
| 11 | 13 |
| 12 namespace net { | 14 namespace net { |
| 13 | 15 |
| 14 namespace { | 16 namespace { |
| 15 | 17 |
| 16 struct TestData { | 18 struct TestData { |
| (...skipping 25 matching lines...) Expand all Loading... |
| 42 | 44 |
| 43 } // namespace | 45 } // namespace |
| 44 | 46 |
| 45 TEST(URLSecurityManager, UseDefaultCredentials) { | 47 TEST(URLSecurityManager, UseDefaultCredentials) { |
| 46 scoped_ptr<HttpAuthFilter> auth_filter( | 48 scoped_ptr<HttpAuthFilter> auth_filter( |
| 47 new HttpAuthFilterWhitelist(kTestAuthWhitelist)); | 49 new HttpAuthFilterWhitelist(kTestAuthWhitelist)); |
| 48 ASSERT_TRUE(auth_filter); | 50 ASSERT_TRUE(auth_filter); |
| 49 // The URL security manager takes ownership of |auth_filter|. | 51 // The URL security manager takes ownership of |auth_filter|. |
| 50 scoped_ptr<URLSecurityManager> url_security_manager( | 52 scoped_ptr<URLSecurityManager> url_security_manager( |
| 51 URLSecurityManager::Create()); | 53 URLSecurityManager::Create()); |
| 52 url_security_manager->SetDefaultWhitelist(auth_filter.Pass()); | 54 url_security_manager->SetDefaultWhitelist(std::move(auth_filter)); |
| 53 ASSERT_TRUE(url_security_manager.get()); | 55 ASSERT_TRUE(url_security_manager.get()); |
| 54 | 56 |
| 55 for (size_t i = 0; i < arraysize(kTestDataList); ++i) { | 57 for (size_t i = 0; i < arraysize(kTestDataList); ++i) { |
| 56 GURL gurl(kTestDataList[i].url); | 58 GURL gurl(kTestDataList[i].url); |
| 57 bool can_use_default = | 59 bool can_use_default = |
| 58 url_security_manager->CanUseDefaultCredentials(gurl); | 60 url_security_manager->CanUseDefaultCredentials(gurl); |
| 59 | 61 |
| 60 EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_use_default) | 62 EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_use_default) |
| 61 << " Run: " << i << " URL: '" << gurl << "'"; | 63 << " Run: " << i << " URL: '" << gurl << "'"; |
| 62 } | 64 } |
| 63 } | 65 } |
| 64 | 66 |
| 65 TEST(URLSecurityManager, CanDelegate) { | 67 TEST(URLSecurityManager, CanDelegate) { |
| 66 scoped_ptr<HttpAuthFilter> auth_filter( | 68 scoped_ptr<HttpAuthFilter> auth_filter( |
| 67 new HttpAuthFilterWhitelist(kTestAuthWhitelist)); | 69 new HttpAuthFilterWhitelist(kTestAuthWhitelist)); |
| 68 ASSERT_TRUE(auth_filter); | 70 ASSERT_TRUE(auth_filter); |
| 69 // The URL security manager takes ownership of |auth_filter|. | 71 // The URL security manager takes ownership of |auth_filter|. |
| 70 scoped_ptr<URLSecurityManager> url_security_manager( | 72 scoped_ptr<URLSecurityManager> url_security_manager( |
| 71 URLSecurityManager::Create()); | 73 URLSecurityManager::Create()); |
| 72 url_security_manager->SetDelegateWhitelist(auth_filter.Pass()); | 74 url_security_manager->SetDelegateWhitelist(std::move(auth_filter)); |
| 73 ASSERT_TRUE(url_security_manager.get()); | 75 ASSERT_TRUE(url_security_manager.get()); |
| 74 | 76 |
| 75 for (size_t i = 0; i < arraysize(kTestDataList); ++i) { | 77 for (size_t i = 0; i < arraysize(kTestDataList); ++i) { |
| 76 GURL gurl(kTestDataList[i].url); | 78 GURL gurl(kTestDataList[i].url); |
| 77 bool can_delegate = url_security_manager->CanDelegate(gurl); | 79 bool can_delegate = url_security_manager->CanDelegate(gurl); |
| 78 EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_delegate) | 80 EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_delegate) |
| 79 << " Run: " << i << " URL: '" << gurl << "'"; | 81 << " Run: " << i << " URL: '" << gurl << "'"; |
| 80 } | 82 } |
| 81 } | 83 } |
| 82 | 84 |
| 83 TEST(URLSecurityManager, CanDelegate_NoWhitelist) { | 85 TEST(URLSecurityManager, CanDelegate_NoWhitelist) { |
| 84 // Nothing can delegate in this case. | 86 // Nothing can delegate in this case. |
| 85 scoped_ptr<URLSecurityManager> url_security_manager( | 87 scoped_ptr<URLSecurityManager> url_security_manager( |
| 86 URLSecurityManager::Create()); | 88 URLSecurityManager::Create()); |
| 87 ASSERT_TRUE(url_security_manager.get()); | 89 ASSERT_TRUE(url_security_manager.get()); |
| 88 | 90 |
| 89 for (size_t i = 0; i < arraysize(kTestDataList); ++i) { | 91 for (size_t i = 0; i < arraysize(kTestDataList); ++i) { |
| 90 GURL gurl(kTestDataList[i].url); | 92 GURL gurl(kTestDataList[i].url); |
| 91 bool can_delegate = url_security_manager->CanDelegate(gurl); | 93 bool can_delegate = url_security_manager->CanDelegate(gurl); |
| 92 EXPECT_FALSE(can_delegate); | 94 EXPECT_FALSE(can_delegate); |
| 93 } | 95 } |
| 94 } | 96 } |
| 95 | 97 |
| 96 | 98 |
| 97 } // namespace net | 99 } // namespace net |
| OLD | NEW |