| Index: net/proxy/proxy_bypass_rules_unittest.cc
|
| diff --git a/net/proxy/proxy_bypass_rules_unittest.cc b/net/proxy/proxy_bypass_rules_unittest.cc
|
| index c099ad620223a9f1d3622413ffc98abc681e0298..84cad71433cc33dcf44d7f71e5f7130b73830b2c 100644
|
| --- a/net/proxy/proxy_bypass_rules_unittest.cc
|
| +++ b/net/proxy/proxy_bypass_rules_unittest.cc
|
| @@ -97,6 +97,15 @@ TEST(ProxyBypassRulesTest, WildcardAtStart) {
|
| EXPECT_FALSE(rules.Matches(GURL("https://www.google.org.com")));
|
| }
|
|
|
| +// Tests a codepath that parses hostnamepattern:port, where "port" is invalid
|
| +// by containing a leading plus.
|
| +TEST(ProxyBypassRulesTest, ParseInvalidPort) {
|
| + ProxyBypassRules rules;
|
| + EXPECT_TRUE(rules.AddRuleFromString("*.org:443"));
|
| + EXPECT_FALSE(rules.AddRuleFromString("*.com:+443"));
|
| + EXPECT_FALSE(rules.AddRuleFromString("*.com:-443"));
|
| +}
|
| +
|
| TEST(ProxyBypassRulesTest, IPV4Address) {
|
| ProxyBypassRules rules;
|
| rules.ParseFromString("192.168.1.1");
|
|
|