Index: net/http/url_security_manager_unittest.cc |
diff --git a/net/http/url_security_manager_unittest.cc b/net/http/url_security_manager_unittest.cc |
index cf072e587cd142dc02bde9383f60e231085d244e..48f504e156428fd818b76ef1b966c5a30e8520ee 100644 |
--- a/net/http/url_security_manager_unittest.cc |
+++ b/net/http/url_security_manager_unittest.cc |
@@ -28,24 +28,24 @@ const char* kTestAuthWhitelist = "*example.com,*foobar.com,baz"; |
// In Posix systems (or on Windows if a whitelist is specified explicitly), |
// everything depends on the whitelist. |
const TestData kTestDataList[] = { |
- { "http://localhost", true, false }, |
- { "http://bat", true, false }, |
- { "http://www.example.com", false, true }, |
- { "http://example.com", false, true }, |
- { "http://foobar.com", false, true }, |
- { "http://boo.foobar.com", false, true }, |
- { "http://baz", true, true }, |
- { "http://www.exampl.com", false, false }, |
- { "http://example.org", false, false }, |
- { "http://foobar.net", false, false }, |
- { "http://boo.fubar.com", false, false }, |
+ {"http://localhost", true, false}, |
+ {"http://bat", true, false}, |
+ {"http://www.example.com", false, true}, |
+ {"http://example.com", false, true}, |
+ {"http://foobar.com", false, true}, |
+ {"http://boo.foobar.com", false, true}, |
+ {"http://baz", true, true}, |
+ {"http://www.exampl.com", false, false}, |
+ {"http://example.org", false, false}, |
+ {"http://foobar.net", false, false}, |
+ {"http://boo.fubar.com", false, false}, |
}; |
} // namespace |
TEST(URLSecurityManager, UseDefaultCredentials) { |
- HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist( |
- kTestAuthWhitelist); |
+ HttpAuthFilterWhitelist* auth_filter = |
+ new HttpAuthFilterWhitelist(kTestAuthWhitelist); |
ASSERT_TRUE(auth_filter); |
// The URL security manager takes ownership of |auth_filter|. |
scoped_ptr<URLSecurityManager> url_security_manager( |
@@ -54,8 +54,7 @@ TEST(URLSecurityManager, UseDefaultCredentials) { |
for (size_t i = 0; i < arraysize(kTestDataList); ++i) { |
GURL gurl(kTestDataList[i].url); |
- bool can_use_default = |
- url_security_manager->CanUseDefaultCredentials(gurl); |
+ bool can_use_default = url_security_manager->CanUseDefaultCredentials(gurl); |
EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_use_default) |
<< " Run: " << i << " URL: '" << gurl << "'"; |
@@ -63,8 +62,8 @@ TEST(URLSecurityManager, UseDefaultCredentials) { |
} |
TEST(URLSecurityManager, CanDelegate) { |
- HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist( |
- kTestAuthWhitelist); |
+ HttpAuthFilterWhitelist* auth_filter = |
+ new HttpAuthFilterWhitelist(kTestAuthWhitelist); |
ASSERT_TRUE(auth_filter); |
// The URL security manager takes ownership of |auth_filter|. |
scoped_ptr<URLSecurityManager> url_security_manager( |
@@ -92,5 +91,4 @@ TEST(URLSecurityManager, CanDelegate_NoWhitelist) { |
} |
} |
- |
} // namespace net |