Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(83)

Side by Side Diff: url/gurl_unittest.cc

Issue 2403713002: Add suborigin logic to url::Origin (Closed)
Patch Set: Address Mike's comments Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <stddef.h> 5 #include <stddef.h>
6 6
7 #include "base/macros.h" 7 #include "base/macros.h"
8 #include "testing/gtest/include/gtest/gtest.h" 8 #include "testing/gtest/include/gtest/gtest.h"
9 #include "url/gurl.h" 9 #include "url/gurl.h"
10 #include "url/url_canon.h" 10 #include "url/url_canon.h"
(...skipping 659 matching lines...) Expand 10 before | Expand all | Expand 10 after
670 EXPECT_TRUE(GURL("HTTPS://BAR").SchemeIsHTTPOrHTTPS()); 670 EXPECT_TRUE(GURL("HTTPS://BAR").SchemeIsHTTPOrHTTPS());
671 EXPECT_FALSE(GURL("ftp://bar/").SchemeIsHTTPOrHTTPS()); 671 EXPECT_FALSE(GURL("ftp://bar/").SchemeIsHTTPOrHTTPS());
672 } 672 }
673 673
674 TEST(GURLTest, SchemeIsWSOrWSS) { 674 TEST(GURLTest, SchemeIsWSOrWSS) {
675 EXPECT_TRUE(GURL("WS://BAR/").SchemeIsWSOrWSS()); 675 EXPECT_TRUE(GURL("WS://BAR/").SchemeIsWSOrWSS());
676 EXPECT_TRUE(GURL("wss://bar/").SchemeIsWSOrWSS()); 676 EXPECT_TRUE(GURL("wss://bar/").SchemeIsWSOrWSS());
677 EXPECT_FALSE(GURL("http://bar/").SchemeIsWSOrWSS()); 677 EXPECT_FALSE(GURL("http://bar/").SchemeIsWSOrWSS());
678 } 678 }
679 679
680 TEST(GURLTest, SchemeIsCryptographic) {
681 EXPECT_TRUE(GURL("https://foo.bar.com/").SchemeIsCryptographic());
682 EXPECT_TRUE(GURL("HTTPS://foo.bar.com/").SchemeIsCryptographic());
683
684 EXPECT_TRUE(GURL("wss://foo.bar.com/").SchemeIsCryptographic());
685 EXPECT_TRUE(GURL("WSS://foo.bar.com/").SchemeIsCryptographic());
686
687 EXPECT_TRUE(GURL("https-so://foo.bar.com/").SchemeIsCryptographic());
688 EXPECT_TRUE(GURL("HTTPS-SO://foo.bar.com/").SchemeIsCryptographic());
nasko 2016/10/13 22:16:45 nit: I'd add mixed case instead of/in addition to
jww 2016/10/14 01:08:58 Done.
689
690 EXPECT_FALSE(GURL("http://foo.bar.com/").SchemeIsCryptographic());
691 EXPECT_FALSE(GURL("ws://foo.bar.com/").SchemeIsCryptographic());
692 EXPECT_FALSE(GURL("http-so://foo.bar.com/").SchemeIsCryptographic());
693 }
694
680 TEST(GURLTest, SchemeIsBlob) { 695 TEST(GURLTest, SchemeIsBlob) {
681 EXPECT_TRUE(GURL("BLOB://BAR/").SchemeIsBlob()); 696 EXPECT_TRUE(GURL("BLOB://BAR/").SchemeIsBlob());
682 EXPECT_TRUE(GURL("blob://bar/").SchemeIsBlob()); 697 EXPECT_TRUE(GURL("blob://bar/").SchemeIsBlob());
683 EXPECT_FALSE(GURL("http://bar/").SchemeIsBlob()); 698 EXPECT_FALSE(GURL("http://bar/").SchemeIsBlob());
684 } 699 }
685 700
701 TEST(GURLTest, SchemeIsSuborigin) {
702 EXPECT_TRUE(GURL("http-so://foo.bar.com/").SchemeIsSuborigin());
703 EXPECT_TRUE(GURL("HTTP-SO://foo.bar.com/").SchemeIsSuborigin());
704 EXPECT_FALSE(GURL("http://foo.bar.com/").SchemeIsSuborigin());
705
706 EXPECT_TRUE(GURL("https-so://foo.bar.com/").SchemeIsSuborigin());
707 EXPECT_TRUE(GURL("HTTPS-SO://foo.bar.com/").SchemeIsSuborigin());
708 EXPECT_FALSE(GURL("https://foo.bar.com/").SchemeIsSuborigin());
709 }
710
686 TEST(GURLTest, ContentAndPathForNonStandardURLs) { 711 TEST(GURLTest, ContentAndPathForNonStandardURLs) {
687 struct TestCase { 712 struct TestCase {
688 const char* url; 713 const char* url;
689 const char* expected; 714 const char* expected;
690 } cases[] = { 715 } cases[] = {
691 {"null", ""}, 716 {"null", ""},
692 {"not-a-standard-scheme:this is arbitrary content", 717 {"not-a-standard-scheme:this is arbitrary content",
693 "this is arbitrary content"}, 718 "this is arbitrary content"},
694 {"view-source:http://example.com/path", "http://example.com/path"}, 719 {"view-source:http://example.com/path", "http://example.com/path"},
695 {"blob:http://example.com/GUID", "http://example.com/GUID"}, 720 {"blob:http://example.com/GUID", "http://example.com/GUID"},
696 {"blob://http://example.com/GUID", "//http://example.com/GUID"}, 721 {"blob://http://example.com/GUID", "//http://example.com/GUID"},
697 {"blob:http://user:password@example.com/GUID", 722 {"blob:http://user:password@example.com/GUID",
698 "http://user:password@example.com/GUID"}, 723 "http://user:password@example.com/GUID"},
699 724
700 // TODO(mkwst): This seems like a bug. https://crbug.com/513600 725 // TODO(mkwst): This seems like a bug. https://crbug.com/513600
701 {"filesystem:http://example.com/path", "/"}, 726 {"filesystem:http://example.com/path", "/"},
702 }; 727 };
703 728
704 for (const auto& test : cases) { 729 for (const auto& test : cases) {
705 GURL url(test.url); 730 GURL url(test.url);
706 EXPECT_EQ(test.expected, url.path()) << test.url; 731 EXPECT_EQ(test.expected, url.path()) << test.url;
707 EXPECT_EQ(test.expected, url.GetContent()) << test.url; 732 EXPECT_EQ(test.expected, url.GetContent()) << test.url;
708 } 733 }
709 } 734 }
710 735
711 } // namespace url 736 } // namespace url
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698