Chromium Code Reviews| Index: url/gurl_unittest.cc |
| diff --git a/url/gurl_unittest.cc b/url/gurl_unittest.cc |
| index 6bfba708b9743e9b270d95cab25aa64884a99bae..c284ca8fe40496197687b5b59115d305b242c0e7 100644 |
| --- a/url/gurl_unittest.cc |
| +++ b/url/gurl_unittest.cc |
| @@ -677,12 +677,37 @@ TEST(GURLTest, SchemeIsWSOrWSS) { |
| EXPECT_FALSE(GURL("http://bar/").SchemeIsWSOrWSS()); |
| } |
| +TEST(GURLTest, SchemeIsCryptographic) { |
| + EXPECT_TRUE(GURL("https://foo.bar.com/").SchemeIsCryptographic()); |
| + EXPECT_TRUE(GURL("HTTPS://foo.bar.com/").SchemeIsCryptographic()); |
| + |
| + EXPECT_TRUE(GURL("wss://foo.bar.com/").SchemeIsCryptographic()); |
| + EXPECT_TRUE(GURL("WSS://foo.bar.com/").SchemeIsCryptographic()); |
| + |
| + EXPECT_TRUE(GURL("https-so://foo.bar.com/").SchemeIsCryptographic()); |
| + EXPECT_TRUE(GURL("HTTPS-SO://foo.bar.com/").SchemeIsCryptographic()); |
|
nasko
2016/10/13 22:16:45
nit: I'd add mixed case instead of/in addition to
jww
2016/10/14 01:08:58
Done.
|
| + |
| + EXPECT_FALSE(GURL("http://foo.bar.com/").SchemeIsCryptographic()); |
| + EXPECT_FALSE(GURL("ws://foo.bar.com/").SchemeIsCryptographic()); |
| + EXPECT_FALSE(GURL("http-so://foo.bar.com/").SchemeIsCryptographic()); |
| +} |
| + |
| TEST(GURLTest, SchemeIsBlob) { |
| EXPECT_TRUE(GURL("BLOB://BAR/").SchemeIsBlob()); |
| EXPECT_TRUE(GURL("blob://bar/").SchemeIsBlob()); |
| EXPECT_FALSE(GURL("http://bar/").SchemeIsBlob()); |
| } |
| +TEST(GURLTest, SchemeIsSuborigin) { |
| + EXPECT_TRUE(GURL("http-so://foo.bar.com/").SchemeIsSuborigin()); |
| + EXPECT_TRUE(GURL("HTTP-SO://foo.bar.com/").SchemeIsSuborigin()); |
| + EXPECT_FALSE(GURL("http://foo.bar.com/").SchemeIsSuborigin()); |
| + |
| + EXPECT_TRUE(GURL("https-so://foo.bar.com/").SchemeIsSuborigin()); |
| + EXPECT_TRUE(GURL("HTTPS-SO://foo.bar.com/").SchemeIsSuborigin()); |
| + EXPECT_FALSE(GURL("https://foo.bar.com/").SchemeIsSuborigin()); |
| +} |
| + |
| TEST(GURLTest, ContentAndPathForNonStandardURLs) { |
| struct TestCase { |
| const char* url; |