Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(514)

Unified Diff: net/proxy/proxy_config_service_linux_unittest.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/proxy/proxy_config_service_linux_unittest.cc
diff --git a/net/proxy/proxy_config_service_linux_unittest.cc b/net/proxy/proxy_config_service_linux_unittest.cc
index 5635a87d053e3ff1039dcca3ee3961c94aabb205..cc597b30e2d74d1969d934bcc8f8f4aea18bceb9 100644
--- a/net/proxy/proxy_config_service_linux_unittest.cc
+++ b/net/proxy/proxy_config_service_linux_unittest.cc
@@ -31,12 +31,9 @@ namespace {
struct EnvVarValues {
// The strange capitalization is so that the field matches the
// environment variable name exactly.
- const char *DESKTOP_SESSION, *HOME,
- *KDEHOME, *KDE_SESSION_VERSION,
- *auto_proxy, *all_proxy,
- *http_proxy, *https_proxy, *ftp_proxy,
- *SOCKS_SERVER, *SOCKS_VERSION,
- *no_proxy;
+ const char* DESKTOP_SESSION, *HOME, *KDEHOME, *KDE_SESSION_VERSION,
+ *auto_proxy, *all_proxy, *http_proxy, *https_proxy, *ftp_proxy,
+ *SOCKS_SERVER, *SOCKS_VERSION, *no_proxy;
};
// Undo macro pollution from GDK includes (from message_loop.h).
@@ -45,15 +42,13 @@ struct EnvVarValues {
// So as to distinguish between an unset gconf boolean variable and
// one that is false.
-enum BoolSettingValue {
- UNSET = 0, TRUE, FALSE
-};
+enum BoolSettingValue { UNSET = 0, TRUE, FALSE };
// Set of values for all gconf settings that we might query.
struct GConfValues {
// strings
- const char *mode, *autoconfig_url,
- *http_host, *secure_host, *ftp_host, *socks_host;
+ const char* mode, *autoconfig_url, *http_host, *secure_host, *ftp_host,
+ *socks_host;
// integers
int http_port, secure_port, ftp_port, socks_port;
// booleans
@@ -64,7 +59,7 @@ struct GConfValues {
// Mapping from a setting name to the location of the corresponding
// value (inside a EnvVarValues or GConfValues struct).
-template<typename key_type, typename value_type>
+template <typename key_type, typename value_type>
struct SettingsTable {
typedef std::map<key_type, value_type*> map_type;
@@ -102,7 +97,7 @@ class MockEnvironment : public base::Environment {
// Zeroes all environment values.
void Reset() {
- EnvVarValues zero_values = { 0 };
+ EnvVarValues zero_values = {0};
values = zero_values;
}
@@ -118,8 +113,8 @@ class MockEnvironment : public base::Environment {
return false;
}
- virtual bool SetVar(const char* variable_name, const std::string& new_value)
- OVERRIDE {
+ virtual bool SetVar(const char* variable_name,
+ const std::string& new_value) OVERRIDE {
ADD_FAILURE();
return false;
}
@@ -137,13 +132,12 @@ class MockEnvironment : public base::Environment {
std::map<std::string, const char**> table;
};
-class MockSettingGetter
- : public ProxyConfigServiceLinux::SettingGetter {
+class MockSettingGetter : public ProxyConfigServiceLinux::SettingGetter {
public:
typedef ProxyConfigServiceLinux::SettingGetter SettingGetter;
MockSettingGetter() {
#define ENTRY(key, field) \
- strings_table.settings[SettingGetter::key] = &values.field
+ strings_table.settings[SettingGetter::key] = &values.field
ENTRY(PROXY_MODE, mode);
ENTRY(PROXY_AUTOCONF_URL, autoconfig_url);
ENTRY(PROXY_HTTP_HOST, http_host);
@@ -152,14 +146,14 @@ class MockSettingGetter
ENTRY(PROXY_SOCKS_HOST, socks_host);
#undef ENTRY
#define ENTRY(key, field) \
- ints_table.settings[SettingGetter::key] = &values.field
+ ints_table.settings[SettingGetter::key] = &values.field
ENTRY(PROXY_HTTP_PORT, http_port);
ENTRY(PROXY_HTTPS_PORT, secure_port);
ENTRY(PROXY_FTP_PORT, ftp_port);
ENTRY(PROXY_SOCKS_PORT, socks_port);
#undef ENTRY
#define ENTRY(key, field) \
- bools_table.settings[SettingGetter::key] = &values.field
+ bools_table.settings[SettingGetter::key] = &values.field
ENTRY(PROXY_USE_HTTP_PROXY, use_proxy);
ENTRY(PROXY_USE_SAME_PROXY, same_proxy);
ENTRY(PROXY_USE_AUTHENTICATION, use_auth);
@@ -171,7 +165,7 @@ class MockSettingGetter
// Zeros all environment values.
void Reset() {
- GConfValues zero_values = { 0 };
+ GConfValues zero_values = {0};
values = zero_values;
}
@@ -182,8 +176,8 @@ class MockSettingGetter
virtual void ShutDown() OVERRIDE {}
- virtual bool SetUpNotifications(ProxyConfigServiceLinux::Delegate* delegate)
- OVERRIDE {
+ virtual bool SetUpNotifications(
+ ProxyConfigServiceLinux::Delegate* delegate) OVERRIDE {
return true;
}
@@ -207,13 +201,13 @@ class MockSettingGetter
virtual bool GetBool(BoolSetting key, bool* result) OVERRIDE {
BoolSettingValue value = bools_table.Get(key);
switch (value) {
- case UNSET:
- return false;
- case TRUE:
- *result = true;
- break;
- case FALSE:
- *result = false;
+ case UNSET:
+ return false;
+ case TRUE:
+ *result = true;
+ break;
+ case FALSE:
+ *result = false;
}
return true;
}
@@ -231,13 +225,9 @@ class MockSettingGetter
return !result->empty();
}
- virtual bool BypassListIsReversed() OVERRIDE {
- return false;
- }
+ virtual bool BypassListIsReversed() OVERRIDE { return false; }
- virtual bool MatchHostsUsingSuffixMatching() OVERRIDE {
- return false;
- }
+ virtual bool MatchHostsUsingSuffixMatching() OVERRIDE { return false; }
// Intentionally public, for convenience when setting up a test.
GConfValues values;
@@ -246,8 +236,8 @@ class MockSettingGetter
SettingsTable<StringSetting, const char*> strings_table;
SettingsTable<BoolSetting, BoolSettingValue> bools_table;
SettingsTable<IntSetting, int> ints_table;
- SettingsTable<StringListSetting,
- std::vector<std::string> > string_lists_table;
+ SettingsTable<StringListSetting, std::vector<std::string> >
+ string_lists_table;
};
} // namespace
@@ -269,7 +259,8 @@ class SynchConfigGetter {
io_thread_.StartWithOptions(options);
// Make sure the thread started.
- io_thread_.message_loop()->PostTask(FROM_HERE,
+ io_thread_.message_loop()->PostTask(
+ FROM_HERE,
base::Bind(&SynchConfigGetter::Init, base::Unretained(this)));
Wait();
}
@@ -279,7 +270,8 @@ class SynchConfigGetter {
// before cleaning up that thread.
delete config_service_;
// Clean up the IO thread.
- io_thread_.message_loop()->PostTask(FROM_HERE,
+ io_thread_.message_loop()->PostTask(
+ FROM_HERE,
base::Bind(&SynchConfigGetter::CleanUp, base::Unretained(this)));
Wait();
}
@@ -299,7 +291,8 @@ class SynchConfigGetter {
// Synchronously gets the proxy config.
net::ProxyConfigService::ConfigAvailability SyncGetLatestProxyConfig(
net::ProxyConfig* config) {
- io_thread_.message_loop()->PostTask(FROM_HERE,
+ io_thread_.message_loop()->PostTask(
+ FROM_HERE,
base::Bind(&SynchConfigGetter::GetLatestConfigOnIOThread,
base::Unretained(this)));
Wait();
@@ -309,9 +302,7 @@ class SynchConfigGetter {
private:
// [Runs on |io_thread_|]
- void Init() {
- event_.Signal();
- }
+ void Init() { event_.Signal(); }
// Calls GetLatestProxyConfig, running on |io_thread_| Signals |event_|
// on completion.
@@ -409,278 +400,259 @@ TEST_F(ProxyConfigServiceLinuxTest, BasicGConfTest) {
GURL pac_url;
ProxyRulesExpectation proxy_rules;
} tests[] = {
- {
- TEST_DESC("No proxying"),
- { // Input.
- "none", // mode
- "", // autoconfig_url
- "", "", "", "", // hosts
- 0, 0, 0, 0, // ports
- FALSE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Auto detect"),
- { // Input.
- "auto", // mode
- "", // autoconfig_url
- "", "", "", "", // hosts
- 0, 0, 0, 0, // ports
- FALSE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- true, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Valid PAC URL"),
- { // Input.
- "auto", // mode
- "http://wpad/wpad.dat", // autoconfig_url
- "", "", "", "", // hosts
- 0, 0, 0, 0, // ports
- FALSE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL("http://wpad/wpad.dat"), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Invalid PAC URL"),
- { // Input.
- "auto", // mode
- "wpad.dat", // autoconfig_url
- "", "", "", "", // hosts
- 0, 0, 0, 0, // ports
- FALSE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Single-host in proxy list"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", "", "", "", // hosts
- 80, 0, 0, 0, // ports
- TRUE, TRUE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "www.google.com:80", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("use_http_proxy is honored"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", "", "", "", // hosts
- 80, 0, 0, 0, // ports
- FALSE, TRUE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("use_http_proxy and use_same_proxy are optional"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", "", "", "", // hosts
- 80, 0, 0, 0, // ports
- UNSET, UNSET, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Single-host, different port"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", "", "", "", // hosts
- 88, 0, 0, 0, // ports
- TRUE, TRUE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "www.google.com:88", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Per-scheme proxy rules"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", // http_host
- "www.foo.com", // secure_host
- "ftp.foo.com", // ftp
- "", // socks
- 88, 110, 121, 0, // ports
- TRUE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:88", // http
- "www.foo.com:110", // https
- "ftp.foo.com:121", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("socks"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "", "", "", "socks.com", // hosts
- 0, 0, 0, 99, // ports
- TRUE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "socks5://socks.com:99", // single proxy
- "") // bypass rules
- },
-
- {
- TEST_DESC("Per-scheme proxy rules with fallback to SOCKS"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", // http_host
- "www.foo.com", // secure_host
- "ftp.foo.com", // ftp
- "foobar.net", // socks
- 88, 110, 121, 99, // ports
- TRUE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerSchemeWithSocks(
- "www.google.com:88", // http
- "www.foo.com:110", // https
- "ftp.foo.com:121", // ftp
- "socks5://foobar.net:99", // socks
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Per-scheme proxy rules (just HTTP) with fallback to SOCKS"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", // http_host
- "", // secure_host
- "", // ftp
- "foobar.net", // socks
- 88, 0, 0, 99, // ports
- TRUE, FALSE, FALSE, // use, same, auth
- empty_ignores, // ignore_hosts
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerSchemeWithSocks(
- "www.google.com:88", // http
- "", // https
- "", // ftp
- "socks5://foobar.net:99", // socks
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Bypass *.google.com"),
- { // Input.
- "manual", // mode
- "", // autoconfig_url
- "www.google.com", "", "", "", // hosts
- 80, 0, 0, 0, // ports
- TRUE, TRUE, FALSE, // use, same, auth
- google_ignores, // ignore_hosts
- },
-
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "www.google.com:80", // single proxy
- "*.google.com"), // bypass rules
- },
- };
+ {
+ TEST_DESC("No proxying"),
+ { // Input.
+ "none", // mode
+ "", // autoconfig_url
+ "", "", "", "", // hosts
+ 0, 0, 0, 0, // ports
+ FALSE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Auto detect"),
+ { // Input.
+ "auto", // mode
+ "", // autoconfig_url
+ "", "", "", "", // hosts
+ 0, 0, 0, 0, // ports
+ FALSE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ true, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Valid PAC URL"),
+ { // Input.
+ "auto", // mode
+ "http://wpad/wpad.dat", // autoconfig_url
+ "", "", "", "", // hosts
+ 0, 0, 0, 0, // ports
+ FALSE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL("http://wpad/wpad.dat"), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Invalid PAC URL"),
+ { // Input.
+ "auto", // mode
+ "wpad.dat", // autoconfig_url
+ "", "", "", "", // hosts
+ 0, 0, 0, 0, // ports
+ FALSE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Single-host in proxy list"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", "", "", "", // hosts
+ 80, 0, 0, 0, // ports
+ TRUE, TRUE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single("www.google.com:80", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("use_http_proxy is honored"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", "", "", "", // hosts
+ 80, 0, 0, 0, // ports
+ FALSE, TRUE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("use_http_proxy and use_same_proxy are optional"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", "", "", "", // hosts
+ 80, 0, 0, 0, // ports
+ UNSET, UNSET, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Single-host, different port"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", "", "", "", // hosts
+ 88, 0, 0, 0, // ports
+ TRUE, TRUE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single("www.google.com:88", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Per-scheme proxy rules"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", // http_host
+ "www.foo.com", // secure_host
+ "ftp.foo.com", // ftp
+ "", // socks
+ 88, 110, 121, 0, // ports
+ TRUE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:88", // http
+ "www.foo.com:110", // https
+ "ftp.foo.com:121", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("socks"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "", "", "", "socks.com", // hosts
+ 0, 0, 0, 99, // ports
+ TRUE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single("socks5://socks.com:99", // single proxy
+ "") // bypass rules
+ },
+ {
+ TEST_DESC("Per-scheme proxy rules with fallback to SOCKS"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", // http_host
+ "www.foo.com", // secure_host
+ "ftp.foo.com", // ftp
+ "foobar.net", // socks
+ 88, 110, 121, 99, // ports
+ TRUE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerSchemeWithSocks(
+ "www.google.com:88", // http
+ "www.foo.com:110", // https
+ "ftp.foo.com:121", // ftp
+ "socks5://foobar.net:99", // socks
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Per-scheme proxy rules (just HTTP) with fallback to SOCKS"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", // http_host
+ "", // secure_host
+ "", // ftp
+ "foobar.net", // socks
+ 88, 0, 0, 99, // ports
+ TRUE, FALSE, FALSE, // use, same, auth
+ empty_ignores, // ignore_hosts
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerSchemeWithSocks(
+ "www.google.com:88", // http
+ "", // https
+ "", // ftp
+ "socks5://foobar.net:99", // socks
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Bypass *.google.com"),
+ { // Input.
+ "manual", // mode
+ "", // autoconfig_url
+ "www.google.com", "", "", "", // hosts
+ 80, 0, 0, 0, // ports
+ TRUE, TRUE, FALSE, // use, same, auth
+ google_ignores, // ignore_hosts
+ },
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single("www.google.com:80", // single proxy
+ "*.google.com"), // bypass rules
+ },
+ };
for (size_t i = 0; i < ARRAYSIZE_UNSAFE(tests); ++i) {
- SCOPED_TRACE(base::StringPrintf("Test[%" PRIuS "] %s", i,
- tests[i].description.c_str()));
+ SCOPED_TRACE(base::StringPrintf(
+ "Test[%" PRIuS "] %s", i, tests[i].description.c_str()));
MockEnvironment* env = new MockEnvironment;
MockSettingGetter* setting_getter = new MockSettingGetter;
SynchConfigGetter sync_config_getter(
@@ -715,280 +687,266 @@ TEST_F(ProxyConfigServiceLinuxTest, BasicEnvTest) {
GURL pac_url;
ProxyRulesExpectation proxy_rules;
} tests[] = {
- {
- TEST_DESC("No proxying"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- NULL, // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- NULL, NULL, // SOCKS
- "*", // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Auto detect"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- "", // auto_proxy
- NULL, // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- NULL, NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- true, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Valid PAC URL"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- "http://wpad/wpad.dat", // auto_proxy
- NULL, // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- NULL, NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL("http://wpad/wpad.dat"), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Invalid PAC URL"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- "wpad.dat", // auto_proxy
- NULL, // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- NULL, NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Single-host in proxy list"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- "www.google.com", // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- NULL, NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "www.google.com:80", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Single-host, different port"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- "www.google.com:99", // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- NULL, NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "www.google.com:99", // single
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Tolerate a scheme"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- "http://www.google.com:99", // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- NULL, NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "www.google.com:99", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Per-scheme proxy rules"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- NULL, // all_proxy
- "www.google.com:80", "www.foo.com:110", "ftp.foo.com:121", // per-proto
- NULL, NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "www.foo.com:110", // https
- "ftp.foo.com:121", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("socks"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- "", // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- "socks.com:888", NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "socks5://socks.com:888", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("socks4"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- "", // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- "socks.com:888", "4", // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "socks4://socks.com:888", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("socks default port"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- "", // all_proxy
- NULL, NULL, NULL, // per-proto proxies
- "socks.com", NULL, // SOCKS
- NULL, // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "socks5://socks.com:1080", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("bypass"),
- { // Input.
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- "www.google.com", // all_proxy
- NULL, NULL, NULL, // per-proto
- NULL, NULL, // SOCKS
- ".google.com, foo.com:99, 1.2.3.4:22, 127.0.0.1/8", // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "www.google.com:80",
- "*.google.com,*foo.com:99,1.2.3.4:22,127.0.0.1/8"),
- },
- };
+ {
+ TEST_DESC("No proxying"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ NULL, // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ NULL, NULL, // SOCKS
+ "*", // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Auto detect"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ "", // auto_proxy
+ NULL, // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ NULL, NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ true, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Valid PAC URL"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ "http://wpad/wpad.dat", // auto_proxy
+ NULL, // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ NULL, NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL("http://wpad/wpad.dat"), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Invalid PAC URL"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ "wpad.dat", // auto_proxy
+ NULL, // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ NULL, NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Single-host in proxy list"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ "www.google.com", // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ NULL, NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single("www.google.com:80", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Single-host, different port"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ "www.google.com:99", // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ NULL, NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single("www.google.com:99", // single
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Tolerate a scheme"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ "http://www.google.com:99", // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ NULL, NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single("www.google.com:99", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Per-scheme proxy rules"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ NULL, // all_proxy
+ "www.google.com:80", "www.foo.com:110",
+ "ftp.foo.com:121", // per-proto
+ NULL, NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "www.foo.com:110", // https
+ "ftp.foo.com:121", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("socks"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ "", // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ "socks.com:888", NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single(
+ "socks5://socks.com:888", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("socks4"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ "", // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ "socks.com:888", "4", // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single(
+ "socks4://socks.com:888", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("socks default port"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ "", // all_proxy
+ NULL, NULL, NULL, // per-proto proxies
+ "socks.com", NULL, // SOCKS
+ NULL, // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single(
+ "socks5://socks.com:1080", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("bypass"),
+ { // Input.
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ "www.google.com", // all_proxy
+ NULL, NULL, NULL, // per-proto
+ NULL, NULL, // SOCKS
+ ".google.com, foo.com:99, 1.2.3.4:22, 127.0.0.1/8", // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single(
+ "www.google.com:80",
+ "*.google.com,*foo.com:99,1.2.3.4:22,127.0.0.1/8"),
+ },
+ };
for (size_t i = 0; i < ARRAYSIZE_UNSAFE(tests); ++i) {
- SCOPED_TRACE(base::StringPrintf("Test[%" PRIuS "] %s", i,
- tests[i].description.c_str()));
+ SCOPED_TRACE(base::StringPrintf(
+ "Test[%" PRIuS "] %s", i, tests[i].description.c_str()));
MockEnvironment* env = new MockEnvironment;
MockSettingGetter* setting_getter = new MockSettingGetter;
SynchConfigGetter sync_config_getter(
@@ -1055,455 +1013,420 @@ TEST_F(ProxyConfigServiceLinuxTest, KDEConfigParser) {
GURL pac_url;
ProxyRulesExpectation proxy_rules;
} tests[] = {
- {
- TEST_DESC("No proxying"),
-
- // Input.
- "[Proxy Settings]\nProxyType=0\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Auto detect"),
-
- // Input.
- "[Proxy Settings]\nProxyType=3\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- true, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Valid PAC URL"),
-
- // Input.
- "[Proxy Settings]\nProxyType=2\n"
- "Proxy Config Script=http://wpad/wpad.dat\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL("http://wpad/wpad.dat"), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Valid PAC file without file://"),
-
- // Input.
- "[Proxy Settings]\nProxyType=2\n"
- "Proxy Config Script=/wpad/wpad.dat\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL("file:///wpad/wpad.dat"), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Per-scheme proxy rules"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
- "httpsProxy=www.foo.com\nftpProxy=ftp.foo.com\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "www.foo.com:80", // https
- "ftp.foo.com:80", // http
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Only HTTP proxy specified"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\n"
- "httpProxy=www.google.com\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Only HTTP proxy specified, different port"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\n"
- "httpProxy=www.google.com:88\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:88", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Only HTTP proxy specified, different port, space-delimited"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\n"
- "httpProxy=www.google.com 88\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:88", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Bypass *.google.com"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
- "NoProxyFor=.google.com\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- "*.google.com"), // bypass rules
- },
-
- {
- TEST_DESC("Bypass *.google.com and *.kde.org"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
- "NoProxyFor=.google.com,.kde.org\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- "*.google.com,*.kde.org"), // bypass rules
- },
-
- {
- TEST_DESC("Correctly parse bypass list with ReversedException"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
- "NoProxyFor=.google.com\nReversedException=true\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerSchemeWithBypassReversed(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- "*.google.com"), // bypass rules
- },
-
- {
- TEST_DESC("socks"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nsocksProxy=socks.com 888\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "socks5://socks.com:888", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("socks4"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nsocksProxy=socks4://socks.com 888\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Single(
- "socks4://socks.com:888", // single proxy
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Treat all hostname patterns as wildcard patterns"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
- "NoProxyFor=google.com,kde.org,<local>\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- "*google.com,*kde.org,<local>"), // bypass rules
- },
-
- {
- TEST_DESC("Allow trailing whitespace after boolean value"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
- "NoProxyFor=.google.com\nReversedException=true \n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerSchemeWithBypassReversed(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- "*.google.com"), // bypass rules
- },
-
- {
- TEST_DESC("Ignore settings outside [Proxy Settings]"),
-
- // Input.
- "httpsProxy=www.foo.com\n[Proxy Settings]\nProxyType=1\n"
- "httpProxy=www.google.com\n[Other Section]\nftpProxy=ftp.foo.com\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Handle CRLF line endings"),
-
- // Input.
- "[Proxy Settings]\r\nProxyType=1\r\nhttpProxy=www.google.com\r\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Handle blank lines and mixed line endings"),
-
- // Input.
- "[Proxy Settings]\r\n\nProxyType=1\n\r\nhttpProxy=www.google.com\n\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Handle localized settings"),
-
- // Input.
- "[Proxy Settings]\nProxyType[$e]=1\nhttpProxy[$e]=www.google.com\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Ignore malformed localized settings"),
-
- // Input.
- "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
- "httpsProxy$e]=www.foo.com\nftpProxy=ftp.foo.com\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "ftp.foo.com:80", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Handle strange whitespace"),
-
- // Input.
- "[Proxy Settings]\nProxyType [$e] =2\n"
- " Proxy Config Script = http:// foo\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL("http:// foo"), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Ignore all of a line which is too long"),
-
- // Input.
- std::string("[Proxy Settings]\nProxyType=1\nftpProxy=ftp.foo.com\n") +
- long_line + "httpsProxy=www.foo.com\nhttpProxy=www.google.com\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.google.com:80", // http
- "", // https
- "ftp.foo.com:80", // ftp
- ""), // bypass rules
- },
-
- {
- TEST_DESC("Indirect Proxy - no env vars set"),
-
- // Input.
- "[Proxy Settings]\nProxyType=4\nhttpProxy=http_proxy\n"
- "httpsProxy=https_proxy\nftpProxy=ftp_proxy\nNoProxyFor=no_proxy\n",
- {}, // env_values
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::Empty(),
- },
-
- {
- TEST_DESC("Indirect Proxy - with env vars set"),
-
- // Input.
- "[Proxy Settings]\nProxyType=4\nhttpProxy=http_proxy\n"
- "httpsProxy=https_proxy\nftpProxy=ftp_proxy\nNoProxyFor=no_proxy\n",
- { // env_values
- NULL, // DESKTOP_SESSION
- NULL, // HOME
- NULL, // KDEHOME
- NULL, // KDE_SESSION_VERSION
- NULL, // auto_proxy
- NULL, // all_proxy
- "www.normal.com", // http_proxy
- "www.secure.com", // https_proxy
- "ftp.foo.com", // ftp_proxy
- NULL, NULL, // SOCKS
- ".google.com, .kde.org", // no_proxy
- },
-
- // Expected result.
- ProxyConfigService::CONFIG_VALID,
- false, // auto_detect
- GURL(), // pac_url
- ProxyRulesExpectation::PerScheme(
- "www.normal.com:80", // http
- "www.secure.com:80", // https
- "ftp.foo.com:80", // ftp
- "*.google.com,*.kde.org"), // bypass rules
- },
-
- };
+ {
+ TEST_DESC("No proxying"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=0\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Auto detect"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=3\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ true, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Valid PAC URL"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=2\n"
+ "Proxy Config Script=http://wpad/wpad.dat\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL("http://wpad/wpad.dat"), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Valid PAC file without file://"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=2\n"
+ "Proxy Config Script=/wpad/wpad.dat\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL("file:///wpad/wpad.dat"), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Per-scheme proxy rules"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
+ "httpsProxy=www.foo.com\nftpProxy=ftp.foo.com\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "www.foo.com:80", // https
+ "ftp.foo.com:80", // http
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Only HTTP proxy specified"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\n"
+ "httpProxy=www.google.com\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Only HTTP proxy specified, different port"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\n"
+ "httpProxy=www.google.com:88\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:88", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC(
+ "Only HTTP proxy specified, different port, space-delimited"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\n"
+ "httpProxy=www.google.com 88\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:88", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Bypass *.google.com"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
+ "NoProxyFor=.google.com\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "", // ftp
+ "*.google.com"), // bypass rules
+ },
+ {
+ TEST_DESC("Bypass *.google.com and *.kde.org"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
+ "NoProxyFor=.google.com,.kde.org\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme(
+ "www.google.com:80", // http
+ "", // https
+ "", // ftp
+ "*.google.com,*.kde.org"), // bypass rules
+ },
+ {
+ TEST_DESC("Correctly parse bypass list with ReversedException"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
+ "NoProxyFor=.google.com\nReversedException=true\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerSchemeWithBypassReversed(
+ "www.google.com:80", // http
+ "", // https
+ "", // ftp
+ "*.google.com"), // bypass rules
+ },
+ {
+ TEST_DESC("socks"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nsocksProxy=socks.com 888\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single(
+ "socks5://socks.com:888", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("socks4"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nsocksProxy=socks4://socks.com 888\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Single(
+ "socks4://socks.com:888", // single proxy
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Treat all hostname patterns as wildcard patterns"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
+ "NoProxyFor=google.com,kde.org,<local>\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme(
+ "www.google.com:80", // http
+ "", // https
+ "", // ftp
+ "*google.com,*kde.org,<local>"), // bypass rules
+ },
+ {
+ TEST_DESC("Allow trailing whitespace after boolean value"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
+ "NoProxyFor=.google.com\nReversedException=true \n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerSchemeWithBypassReversed(
+ "www.google.com:80", // http
+ "", // https
+ "", // ftp
+ "*.google.com"), // bypass rules
+ },
+ {
+ TEST_DESC("Ignore settings outside [Proxy Settings]"),
+
+ // Input.
+ "httpsProxy=www.foo.com\n[Proxy Settings]\nProxyType=1\n"
+ "httpProxy=www.google.com\n[Other Section]\nftpProxy=ftp.foo.com\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Handle CRLF line endings"),
+
+ // Input.
+ "[Proxy Settings]\r\nProxyType=1\r\nhttpProxy=www.google.com\r\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Handle blank lines and mixed line endings"),
+
+ // Input.
+ "[Proxy Settings]\r\n\nProxyType=1\n\r\nhttpProxy=www.google.com\n\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Handle localized settings"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType[$e]=1\nhttpProxy[$e]=www.google.com\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Ignore malformed localized settings"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=1\nhttpProxy=www.google.com\n"
+ "httpsProxy$e]=www.foo.com\nftpProxy=ftp.foo.com\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "ftp.foo.com:80", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Handle strange whitespace"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType [$e] =2\n"
+ " Proxy Config Script = http:// foo\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL("http:// foo"), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Ignore all of a line which is too long"),
+
+ // Input.
+ std::string("[Proxy Settings]\nProxyType=1\nftpProxy=ftp.foo.com\n") +
+ long_line + "httpsProxy=www.foo.com\nhttpProxy=www.google.com\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme("www.google.com:80", // http
+ "", // https
+ "ftp.foo.com:80", // ftp
+ ""), // bypass rules
+ },
+ {
+ TEST_DESC("Indirect Proxy - no env vars set"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=4\nhttpProxy=http_proxy\n"
+ "httpsProxy=https_proxy\nftpProxy=ftp_proxy\nNoProxyFor=no_proxy\n",
+ {}, // env_values
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::Empty(),
+ },
+ {
+ TEST_DESC("Indirect Proxy - with env vars set"),
+
+ // Input.
+ "[Proxy Settings]\nProxyType=4\nhttpProxy=http_proxy\n"
+ "httpsProxy=https_proxy\nftpProxy=ftp_proxy\nNoProxyFor=no_proxy\n",
+ { // env_values
+ NULL, // DESKTOP_SESSION
+ NULL, // HOME
+ NULL, // KDEHOME
+ NULL, // KDE_SESSION_VERSION
+ NULL, // auto_proxy
+ NULL, // all_proxy
+ "www.normal.com", // http_proxy
+ "www.secure.com", // https_proxy
+ "ftp.foo.com", // ftp_proxy
+ NULL, NULL, // SOCKS
+ ".google.com, .kde.org", // no_proxy
+ },
+
+ // Expected result.
+ ProxyConfigService::CONFIG_VALID,
+ false, // auto_detect
+ GURL(), // pac_url
+ ProxyRulesExpectation::PerScheme(
+ "www.normal.com:80", // http
+ "www.secure.com:80", // https
+ "ftp.foo.com:80", // ftp
+ "*.google.com,*.kde.org"), // bypass rules
+ },
+ };
for (size_t i = 0; i < ARRAYSIZE_UNSAFE(tests); ++i) {
- SCOPED_TRACE(base::StringPrintf("Test[%" PRIuS "] %s", i,
- tests[i].description.c_str()));
+ SCOPED_TRACE(base::StringPrintf(
+ "Test[%" PRIuS "] %s", i, tests[i].description.c_str()));
MockEnvironment* env = new MockEnvironment;
env->values = tests[i].env_values;
// Force the KDE getter to be used and tell it where the test is.
env->values.DESKTOP_SESSION = "kde4";
env->values.KDEHOME = kde_home_.value().c_str();
- SynchConfigGetter sync_config_getter(
- new ProxyConfigServiceLinux(env));
+ SynchConfigGetter sync_config_getter(new ProxyConfigServiceLinux(env));
ProxyConfig config;
// Overwrite the kioslaverc file.
- base::WriteFile(kioslaverc_, tests[i].kioslaverc.c_str(),
- tests[i].kioslaverc.length());
+ base::WriteFile(
+ kioslaverc_, tests[i].kioslaverc.c_str(), tests[i].kioslaverc.length());
sync_config_getter.SetupAndInitialFetch();
ProxyConfigService::ConfigAvailability availability =
sync_config_getter.SyncGetLatestProxyConfig(&config);
@@ -1521,8 +1444,9 @@ TEST_F(ProxyConfigServiceLinuxTest, KDEHomePicker) {
// Auto detect proxy settings.
std::string slaverc3 = "[Proxy Settings]\nProxyType=3\n";
// Valid PAC URL.
- std::string slaverc4 = "[Proxy Settings]\nProxyType=2\n"
- "Proxy Config Script=http://wpad/wpad.dat\n";
+ std::string slaverc4 =
+ "[Proxy Settings]\nProxyType=2\n"
+ "Proxy Config Script=http://wpad/wpad.dat\n";
GURL slaverc4_pac_url("http://wpad/wpad.dat");
// Overwrite the .kde kioslaverc file.
@@ -1532,12 +1456,12 @@ TEST_F(ProxyConfigServiceLinuxTest, KDEHomePicker) {
// we created the directory for $HOME in the test setup.
CHECK(!base::DirectoryExists(kde4_home_));
- { SCOPED_TRACE("KDE4, no .kde4 directory, verify fallback");
+ {
+ SCOPED_TRACE("KDE4, no .kde4 directory, verify fallback");
MockEnvironment* env = new MockEnvironment;
env->values.DESKTOP_SESSION = "kde4";
env->values.HOME = user_home_.value().c_str();
- SynchConfigGetter sync_config_getter(
- new ProxyConfigServiceLinux(env));
+ SynchConfigGetter sync_config_getter(new ProxyConfigServiceLinux(env));
ProxyConfig config;
sync_config_getter.SetupAndInitialFetch();
EXPECT_EQ(ProxyConfigService::CONFIG_VALID,
@@ -1552,12 +1476,12 @@ TEST_F(ProxyConfigServiceLinuxTest, KDEHomePicker) {
base::WriteFile(kioslaverc4_, slaverc4.c_str(), slaverc4.length());
CHECK(base::PathExists(kioslaverc4_));
- { SCOPED_TRACE("KDE4, .kde4 directory present, use it");
+ {
+ SCOPED_TRACE("KDE4, .kde4 directory present, use it");
MockEnvironment* env = new MockEnvironment;
env->values.DESKTOP_SESSION = "kde4";
env->values.HOME = user_home_.value().c_str();
- SynchConfigGetter sync_config_getter(
- new ProxyConfigServiceLinux(env));
+ SynchConfigGetter sync_config_getter(new ProxyConfigServiceLinux(env));
ProxyConfig config;
sync_config_getter.SetupAndInitialFetch();
EXPECT_EQ(ProxyConfigService::CONFIG_VALID,
@@ -1566,12 +1490,12 @@ TEST_F(ProxyConfigServiceLinuxTest, KDEHomePicker) {
EXPECT_EQ(slaverc4_pac_url, config.pac_url());
}
- { SCOPED_TRACE("KDE3, .kde4 directory present, ignore it");
+ {
+ SCOPED_TRACE("KDE3, .kde4 directory present, ignore it");
MockEnvironment* env = new MockEnvironment;
env->values.DESKTOP_SESSION = "kde";
env->values.HOME = user_home_.value().c_str();
- SynchConfigGetter sync_config_getter(
- new ProxyConfigServiceLinux(env));
+ SynchConfigGetter sync_config_getter(new ProxyConfigServiceLinux(env));
ProxyConfig config;
sync_config_getter.SetupAndInitialFetch();
EXPECT_EQ(ProxyConfigService::CONFIG_VALID,
@@ -1580,13 +1504,13 @@ TEST_F(ProxyConfigServiceLinuxTest, KDEHomePicker) {
EXPECT_EQ(GURL(), config.pac_url());
}
- { SCOPED_TRACE("KDE4, .kde4 directory present, KDEHOME set to .kde");
+ {
+ SCOPED_TRACE("KDE4, .kde4 directory present, KDEHOME set to .kde");
MockEnvironment* env = new MockEnvironment;
env->values.DESKTOP_SESSION = "kde4";
env->values.HOME = user_home_.value().c_str();
env->values.KDEHOME = kde_home_.value().c_str();
- SynchConfigGetter sync_config_getter(
- new ProxyConfigServiceLinux(env));
+ SynchConfigGetter sync_config_getter(new ProxyConfigServiceLinux(env));
ProxyConfig config;
sync_config_getter.SetupAndInitialFetch();
EXPECT_EQ(ProxyConfigService::CONFIG_VALID,
@@ -1599,12 +1523,12 @@ TEST_F(ProxyConfigServiceLinuxTest, KDEHomePicker) {
// and make sure we then use .kde instead of .kde4 since it's newer.
base::TouchFile(kde4_config_, base::Time(), base::Time());
- { SCOPED_TRACE("KDE4, very old .kde4 directory present, use .kde");
+ {
+ SCOPED_TRACE("KDE4, very old .kde4 directory present, use .kde");
MockEnvironment* env = new MockEnvironment;
env->values.DESKTOP_SESSION = "kde4";
env->values.HOME = user_home_.value().c_str();
- SynchConfigGetter sync_config_getter(
- new ProxyConfigServiceLinux(env));
+ SynchConfigGetter sync_config_getter(new ProxyConfigServiceLinux(env));
ProxyConfig config;
sync_config_getter.SetupAndInitialFetch();
EXPECT_EQ(ProxyConfigService::CONFIG_VALID,

Powered by Google App Engine
This is Rietveld 408576698