| Index: content/renderer/origin_trials/trial_token_validator_unittest.cc
|
| diff --git a/content/renderer/origin_trials/trial_token_validator_unittest.cc b/content/renderer/origin_trials/trial_token_validator_unittest.cc
|
| index 2bdb88836eebd36f3018be63fb67536b06c6a737..858aa6f1566917a20b2fedf6dfc865ce67e7427b 100644
|
| --- a/content/renderer/origin_trials/trial_token_validator_unittest.cc
|
| +++ b/content/renderer/origin_trials/trial_token_validator_unittest.cc
|
| @@ -11,6 +11,7 @@
|
| #include "base/time/time.h"
|
| #include "content/public/renderer/content_renderer_client.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| +#include "url/gurl.h"
|
|
|
| namespace content {
|
|
|
| @@ -84,7 +85,10 @@ class TestContentRendererClient : public content::ContentRendererClient {
|
|
|
| class TrialTokenValidatorTest : public testing::Test {
|
| public:
|
| - TrialTokenValidatorTest() {
|
| + TrialTokenValidatorTest()
|
| + : appropriate_origin_(GURL(kAppropriateOrigin)),
|
| + inappropriate_origin_(GURL(kInappropriateOrigin)),
|
| + insecure_origin_(GURL(kInsecureOrigin)) {
|
| SetPublicKey(kTestPublicKey);
|
| SetRendererClientForTesting(&test_content_renderer_client_);
|
| }
|
| @@ -94,6 +98,9 @@ class TrialTokenValidatorTest : public testing::Test {
|
| }
|
|
|
| TrialTokenValidator trial_token_validator_;
|
| + const url::Origin appropriate_origin_;
|
| + const url::Origin inappropriate_origin_;
|
| + const url::Origin insecure_origin_;
|
|
|
| private:
|
| TestContentRendererClient test_content_renderer_client_;
|
| @@ -101,40 +108,40 @@ class TrialTokenValidatorTest : public testing::Test {
|
|
|
| TEST_F(TrialTokenValidatorTest, ValidateValidToken) {
|
| EXPECT_TRUE(trial_token_validator_.validateToken(
|
| - kSampleToken, kAppropriateOrigin, kAppropriateFeatureName));
|
| + kSampleToken, appropriate_origin_, kAppropriateFeatureName));
|
| }
|
|
|
| TEST_F(TrialTokenValidatorTest, ValidateInappropriateOrigin) {
|
| EXPECT_FALSE(TrialTokenValidator().validateToken(
|
| - kSampleToken, kInappropriateOrigin, kAppropriateFeatureName));
|
| + kSampleToken, inappropriate_origin_, kAppropriateFeatureName));
|
| EXPECT_FALSE(TrialTokenValidator().validateToken(
|
| - kSampleToken, kInsecureOrigin, kAppropriateFeatureName));
|
| + kSampleToken, insecure_origin_, kAppropriateFeatureName));
|
| }
|
|
|
| TEST_F(TrialTokenValidatorTest, ValidateInappropriateFeature) {
|
| EXPECT_FALSE(TrialTokenValidator().validateToken(
|
| - kSampleToken, kAppropriateOrigin, kInappropriateFeatureName));
|
| + kSampleToken, appropriate_origin_, kInappropriateFeatureName));
|
| }
|
|
|
| TEST_F(TrialTokenValidatorTest, ValidateInvalidSignature) {
|
| EXPECT_FALSE(TrialTokenValidator().validateToken(
|
| - kInvalidSignatureToken, kAppropriateOrigin, kAppropriateFeatureName));
|
| + kInvalidSignatureToken, appropriate_origin_, kAppropriateFeatureName));
|
| }
|
|
|
| TEST_F(TrialTokenValidatorTest, ValidateUnparsableToken) {
|
| EXPECT_FALSE(TrialTokenValidator().validateToken(
|
| - kUnparsableToken, kAppropriateOrigin, kAppropriateFeatureName));
|
| + kUnparsableToken, appropriate_origin_, kAppropriateFeatureName));
|
| }
|
|
|
| TEST_F(TrialTokenValidatorTest, ValidateExpiredToken) {
|
| EXPECT_FALSE(TrialTokenValidator().validateToken(
|
| - kExpiredToken, kAppropriateOrigin, kAppropriateFeatureName));
|
| + kExpiredToken, appropriate_origin_, kAppropriateFeatureName));
|
| }
|
|
|
| TEST_F(TrialTokenValidatorTest, ValidateValidTokenWithIncorrectKey) {
|
| SetPublicKey(kTestPublicKey2);
|
| EXPECT_FALSE(TrialTokenValidator().validateToken(
|
| - kSampleToken, kAppropriateOrigin, kAppropriateFeatureName));
|
| + kSampleToken, appropriate_origin_, kAppropriateFeatureName));
|
| }
|
|
|
| } // namespace content
|
|
|