OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/proxy/proxy_bypass_rules.h" | 5 #include "net/proxy/proxy_bypass_rules.h" |
6 | 6 |
7 #include "base/strings/string_util.h" | 7 #include "base/strings/string_util.h" |
8 #include "base/strings/stringprintf.h" | 8 #include "base/strings/stringprintf.h" |
9 #include "net/proxy/proxy_config_service_common_unittest.h" | 9 #include "net/proxy/proxy_config_service_common_unittest.h" |
10 #include "testing/gtest/include/gtest/gtest.h" | 10 #include "testing/gtest/include/gtest/gtest.h" |
(...skipping 225 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
236 | 236 |
237 EXPECT_FALSE(rules1.Equals(rules2)); | 237 EXPECT_FALSE(rules1.Equals(rules2)); |
238 EXPECT_FALSE(rules2.Equals(rules1)); | 238 EXPECT_FALSE(rules2.Equals(rules1)); |
239 } | 239 } |
240 | 240 |
241 TEST(ProxyBypassRulesTest, BypassLocalNames) { | 241 TEST(ProxyBypassRulesTest, BypassLocalNames) { |
242 const struct { | 242 const struct { |
243 const char* url; | 243 const char* url; |
244 bool expected_is_local; | 244 bool expected_is_local; |
245 } tests[] = { | 245 } tests[] = { |
246 // Single-component hostnames are considered local. | 246 // Single-component hostnames are considered local. |
247 {"http://localhost/x", true}, | 247 {"http://localhost/x", true}, |
248 {"http://www", true}, | 248 {"http://www", true}, |
249 | 249 |
250 // IPv4 loopback interface. | 250 // IPv4 loopback interface. |
251 {"http://127.0.0.1/x", true}, | 251 {"http://127.0.0.1/x", true}, |
252 {"http://127.0.0.1:80/x", true}, | 252 {"http://127.0.0.1:80/x", true}, |
253 | 253 |
254 // IPv6 loopback interface. | 254 // IPv6 loopback interface. |
255 {"http://[::1]:80/x", true}, | 255 {"http://[::1]:80/x", true}, |
256 {"http://[0:0::1]:6233/x", true}, | 256 {"http://[0:0::1]:6233/x", true}, |
257 {"http://[0:0:0:0:0:0:0:1]/x", true}, | 257 {"http://[0:0:0:0:0:0:0:1]/x", true}, |
258 | 258 |
259 // Non-local URLs. | 259 // Non-local URLs. |
260 {"http://foo.com/", false}, | 260 {"http://foo.com/", false}, |
261 {"http://localhost.i/", false}, | 261 {"http://localhost.i/", false}, |
262 {"http://www.google.com/", false}, | 262 {"http://www.google.com/", false}, |
263 {"http://192.168.0.1/", false}, | 263 {"http://192.168.0.1/", false}, |
264 | 264 |
265 // Try with different protocols. | 265 // Try with different protocols. |
266 {"ftp://127.0.0.1/x", true}, | 266 {"ftp://127.0.0.1/x", true}, |
267 {"ftp://foobar.com/x", false}, | 267 {"ftp://foobar.com/x", false}, |
268 | 268 |
269 // This is a bit of a gray-area, but GURL does not strip trailing dots | 269 // This is a bit of a gray-area, but GURL does not strip trailing dots |
270 // in host-names, so the following are considered non-local. | 270 // in host-names, so the following are considered non-local. |
271 {"http://www./x", false}, | 271 {"http://www./x", false}, |
272 {"http://localhost./x", false}, | 272 {"http://localhost./x", false}, |
273 }; | 273 }; |
274 | 274 |
275 ProxyBypassRules rules; | 275 ProxyBypassRules rules; |
276 rules.ParseFromString("<local>"); | 276 rules.ParseFromString("<local>"); |
277 | 277 |
278 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(tests); ++i) { | 278 for (size_t i = 0; i < ARRAYSIZE_UNSAFE(tests); ++i) { |
279 SCOPED_TRACE(base::StringPrintf( | 279 SCOPED_TRACE( |
280 "Test[%d]: %s", static_cast<int>(i), tests[i].url)); | 280 base::StringPrintf("Test[%d]: %s", static_cast<int>(i), tests[i].url)); |
281 EXPECT_EQ(tests[i].expected_is_local, rules.Matches(GURL(tests[i].url))); | 281 EXPECT_EQ(tests[i].expected_is_local, rules.Matches(GURL(tests[i].url))); |
282 } | 282 } |
283 } | 283 } |
284 | 284 |
285 TEST(ProxyBypassRulesTest, ParseAndMatchCIDR_IPv4) { | 285 TEST(ProxyBypassRulesTest, ParseAndMatchCIDR_IPv4) { |
286 ProxyBypassRules rules; | 286 ProxyBypassRules rules; |
287 rules.ParseFromString("192.168.1.1/16"); | 287 rules.ParseFromString("192.168.1.1/16"); |
288 ASSERT_EQ(1u, rules.rules().size()); | 288 ASSERT_EQ(1u, rules.rules().size()); |
289 EXPECT_EQ("192.168.1.1/16", rules.rules()[0]->ToString()); | 289 EXPECT_EQ("192.168.1.1/16", rules.rules()[0]->ToString()); |
290 | 290 |
(...skipping 15 matching lines...) Expand all Loading... |
306 EXPECT_EQ("a:b:c:d::/48", rules.rules()[0]->ToString()); | 306 EXPECT_EQ("a:b:c:d::/48", rules.rules()[0]->ToString()); |
307 | 307 |
308 EXPECT_TRUE(rules.Matches(GURL("http://[A:b:C:9::]"))); | 308 EXPECT_TRUE(rules.Matches(GURL("http://[A:b:C:9::]"))); |
309 EXPECT_FALSE(rules.Matches(GURL("http://foobar.com"))); | 309 EXPECT_FALSE(rules.Matches(GURL("http://foobar.com"))); |
310 EXPECT_FALSE(rules.Matches(GURL("http://192.169.1.1"))); | 310 EXPECT_FALSE(rules.Matches(GURL("http://192.169.1.1"))); |
311 } | 311 } |
312 | 312 |
313 } // namespace | 313 } // namespace |
314 | 314 |
315 } // namespace net | 315 } // namespace net |
OLD | NEW |