| Index: third_party/WebKit/Source/core/fetch/ResourceLoaderOptionsTest.cpp
|
| diff --git a/third_party/WebKit/Source/core/fetch/ResourceLoaderOptionsTest.cpp b/third_party/WebKit/Source/core/fetch/ResourceLoaderOptionsTest.cpp
|
| deleted file mode 100644
|
| index 1ad930ed7d7d5471441b0ee0db5057e7b243b588..0000000000000000000000000000000000000000
|
| --- a/third_party/WebKit/Source/core/fetch/ResourceLoaderOptionsTest.cpp
|
| +++ /dev/null
|
| @@ -1,110 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "core/fetch/ResourceLoaderOptions.h"
|
| -
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -#include <type_traits>
|
| -
|
| -namespace blink {
|
| -
|
| -namespace {
|
| -
|
| -TEST(ResourceLoaderOptionsTest, DeepCopy) {
|
| - // Check that the fields of ResourceLoaderOptions are enums, except for
|
| - // initiatorInfo and securityOrigin.
|
| - static_assert(std::is_enum<DataBufferingPolicy>::value,
|
| - "DataBufferingPolicy should be an enum");
|
| - static_assert(std::is_enum<StoredCredentials>::value,
|
| - "StoredCredentials should be an enum");
|
| - static_assert(std::is_enum<CredentialRequest>::value,
|
| - "CredentialRequest should be an enum");
|
| - static_assert(std::is_enum<ContentSecurityPolicyDisposition>::value,
|
| - "ContentSecurityPolicyDisposition should be an enum");
|
| - static_assert(std::is_enum<RequestInitiatorContext>::value,
|
| - "RequestInitiatorContext should be an enum");
|
| - static_assert(std::is_enum<SynchronousPolicy>::value,
|
| - "SynchronousPolicy should be an enum");
|
| - static_assert(std::is_enum<CORSEnabled>::value,
|
| - "CORSEnabled should be an enum");
|
| -
|
| - ResourceLoaderOptions original;
|
| - RefPtr<SecurityOrigin> securityOrigin =
|
| - SecurityOrigin::createFromString("http://www.google.com");
|
| - original.securityOrigin = securityOrigin;
|
| - original.initiatorInfo.name = AtomicString("xmlhttprequest");
|
| -
|
| - CrossThreadResourceLoaderOptionsData copyData =
|
| - CrossThreadCopier<ResourceLoaderOptions>::copy(original);
|
| - ResourceLoaderOptions copy = copyData;
|
| -
|
| - // Check that contents are correctly copied to |copyData|
|
| - EXPECT_EQ(original.dataBufferingPolicy, copyData.dataBufferingPolicy);
|
| - EXPECT_EQ(original.allowCredentials, copyData.allowCredentials);
|
| - EXPECT_EQ(original.credentialsRequested, copyData.credentialsRequested);
|
| - EXPECT_EQ(original.contentSecurityPolicyOption,
|
| - copyData.contentSecurityPolicyOption);
|
| - EXPECT_EQ(original.initiatorInfo.name, copyData.initiatorInfo.name);
|
| - EXPECT_EQ(original.initiatorInfo.position, copyData.initiatorInfo.position);
|
| - EXPECT_EQ(original.initiatorInfo.startTime, copyData.initiatorInfo.startTime);
|
| - EXPECT_EQ(original.requestInitiatorContext, copyData.requestInitiatorContext);
|
| - EXPECT_EQ(original.synchronousPolicy, copyData.synchronousPolicy);
|
| - EXPECT_EQ(original.corsEnabled, copyData.corsEnabled);
|
| - EXPECT_EQ(original.securityOrigin->protocol(),
|
| - copyData.securityOrigin->protocol());
|
| - EXPECT_EQ(original.securityOrigin->host(), copyData.securityOrigin->host());
|
| - EXPECT_EQ(original.securityOrigin->domain(),
|
| - copyData.securityOrigin->domain());
|
| -
|
| - // Check that pointers are different between |original| and |copyData|
|
| - EXPECT_NE(original.initiatorInfo.name.impl(),
|
| - copyData.initiatorInfo.name.impl());
|
| - EXPECT_NE(original.securityOrigin.get(), copyData.securityOrigin.get());
|
| - EXPECT_NE(original.securityOrigin->protocol().impl(),
|
| - copyData.securityOrigin->protocol().impl());
|
| - EXPECT_NE(original.securityOrigin->host().impl(),
|
| - copyData.securityOrigin->host().impl());
|
| - EXPECT_NE(original.securityOrigin->domain().impl(),
|
| - copyData.securityOrigin->domain().impl());
|
| -
|
| - // Check that contents are correctly copied to |copy|
|
| - EXPECT_EQ(original.dataBufferingPolicy, copy.dataBufferingPolicy);
|
| - EXPECT_EQ(original.allowCredentials, copy.allowCredentials);
|
| - EXPECT_EQ(original.credentialsRequested, copy.credentialsRequested);
|
| - EXPECT_EQ(original.contentSecurityPolicyOption,
|
| - copy.contentSecurityPolicyOption);
|
| - EXPECT_EQ(original.initiatorInfo.name, copy.initiatorInfo.name);
|
| - EXPECT_EQ(original.initiatorInfo.position, copy.initiatorInfo.position);
|
| - EXPECT_EQ(original.initiatorInfo.startTime, copy.initiatorInfo.startTime);
|
| - EXPECT_EQ(original.requestInitiatorContext, copy.requestInitiatorContext);
|
| - EXPECT_EQ(original.synchronousPolicy, copy.synchronousPolicy);
|
| - EXPECT_EQ(original.corsEnabled, copy.corsEnabled);
|
| - EXPECT_EQ(original.securityOrigin->protocol(),
|
| - copy.securityOrigin->protocol());
|
| - EXPECT_EQ(original.securityOrigin->host(), copy.securityOrigin->host());
|
| - EXPECT_EQ(original.securityOrigin->domain(), copy.securityOrigin->domain());
|
| -
|
| - // Check that pointers are different between |original| and |copy|
|
| - // FIXME: When |original| and |copy| are in different threads, then
|
| - // EXPECT_NE(original.initiatorInfo.name.impl(),
|
| - // copy.initiatorInfo.name.impl());
|
| - // should pass. However, in the unit test here, these two pointers are the
|
| - // same, because initiatorInfo.name is AtomicString.
|
| - EXPECT_NE(original.securityOrigin.get(), copy.securityOrigin.get());
|
| - EXPECT_NE(original.securityOrigin->protocol().impl(),
|
| - copy.securityOrigin->protocol().impl());
|
| - EXPECT_NE(original.securityOrigin->host().impl(),
|
| - copy.securityOrigin->host().impl());
|
| - EXPECT_NE(original.securityOrigin->domain().impl(),
|
| - copy.securityOrigin->domain().impl());
|
| -
|
| - // FIXME: The checks for content equality/pointer inequality for
|
| - // securityOrigin here is not complete (i.e. m_filePath is not checked). A
|
| - // unit test for SecurityOrigin::isolatedCopy() that covers these checks
|
| - // should be added.
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -} // namespace blink
|
|
|