| Index: content/common/experiments/api_key_unittest.cc
|
| diff --git a/content/common/experiments/api_key_unittest.cc b/content/common/experiments/api_key_unittest.cc
|
| index 75edd54da40169ceaafe4fec8afc29231bcfa7ce..d2103913e7aa902688100aa9afc96c7d536c53b3 100644
|
| --- a/content/common/experiments/api_key_unittest.cc
|
| +++ b/content/common/experiments/api_key_unittest.cc
|
| @@ -15,10 +15,20 @@ namespace content {
|
|
|
| namespace {
|
|
|
| +// This is a good key, signed with the test private key.
|
| const char* kSampleAPIKey =
|
| - "Signature|https://valid.example.com|Frobulate|1458766277";
|
| -
|
| -const char* kExpectedAPIKeySignature = "Signature";
|
| + "fsnbBl0XwKysvzH3d4TtIomsD9teP0PFfqxIYIAksfipEjB+cXAwI0tUzkYES4H0zZUZ2S982"
|
| + "cZVEmrv0uX2LYKmsfXUhgZCwm46Xx6ZzX3BIg/U1noIlr50O+eB0iHAxe98Ph1NM1gPIlyaev"
|
| + "Lw75PPmXT5kUh15lJy+UPkKB8q52p3TKa2024Q3D2kGUWZ8DBD2zR5G+oHRtnKqfAh5fcTQyL"
|
| + "Oa37NL66h0kTZ8WfvzATfTuAaAYuw+H5sYYeYTLrrVxhDuYqu/+kRzlQ42jlpNA0xkKEqRiIz"
|
| + "X0erG2umU/l8SQpvdXBC87JtOIseHS9dSUoKKRO1XWnmgXX9dA==|https://valid.exampl"
|
| + "e.com|Frobulate|1458766277";
|
| +const char* kExpectedAPIKeySignature =
|
| + "fsnbBl0XwKysvzH3d4TtIomsD9teP0PFfqxIYIAksfipEjB+cXAwI0tUzkYES4H0zZUZ2S982"
|
| + "cZVEmrv0uX2LYKmsfXUhgZCwm46Xx6ZzX3BIg/U1noIlr50O+eB0iHAxe98Ph1NM1gPIlyaev"
|
| + "Lw75PPmXT5kUh15lJy+UPkKB8q52p3TKa2024Q3D2kGUWZ8DBD2zR5G+oHRtnKqfAh5fcTQyL"
|
| + "Oa37NL66h0kTZ8WfvzATfTuAaAYuw+H5sYYeYTLrrVxhDuYqu/+kRzlQ42jlpNA0xkKEqRiIz"
|
| + "X0erG2umU/l8SQpvdXBC87JtOIseHS9dSUoKKRO1XWnmgXX9dA==";
|
| const char* kExpectedAPIKeyData =
|
| "https://valid.example.com|Frobulate|1458766277";
|
| const char* kExpectedAPIName = "Frobulate";
|
| @@ -131,4 +141,9 @@ TEST_F(ApiKeyTest, KeyIsAppropriateForOriginAndAPI) {
|
| EXPECT_FALSE(key->IsAppropriate(kExpectedOrigin, kInvalidAPIName));
|
| }
|
|
|
| +TEST_F(ApiKeyTest, ValidateWhenNotExpired) {
|
| + scoped_ptr<ApiKey> key = ApiKey::Parse(kSampleAPIKey);
|
| + ASSERT_TRUE(key);
|
| +}
|
| +
|
| } // namespace content
|
|
|