| Index: net/http/url_security_manager_unittest.cc
|
| diff --git a/net/http/url_security_manager_unittest.cc b/net/http/url_security_manager_unittest.cc
|
| index cf072e587cd142dc02bde9383f60e231085d244e..48f504e156428fd818b76ef1b966c5a30e8520ee 100644
|
| --- a/net/http/url_security_manager_unittest.cc
|
| +++ b/net/http/url_security_manager_unittest.cc
|
| @@ -28,24 +28,24 @@ const char* kTestAuthWhitelist = "*example.com,*foobar.com,baz";
|
| // In Posix systems (or on Windows if a whitelist is specified explicitly),
|
| // everything depends on the whitelist.
|
| const TestData kTestDataList[] = {
|
| - { "http://localhost", true, false },
|
| - { "http://bat", true, false },
|
| - { "http://www.example.com", false, true },
|
| - { "http://example.com", false, true },
|
| - { "http://foobar.com", false, true },
|
| - { "http://boo.foobar.com", false, true },
|
| - { "http://baz", true, true },
|
| - { "http://www.exampl.com", false, false },
|
| - { "http://example.org", false, false },
|
| - { "http://foobar.net", false, false },
|
| - { "http://boo.fubar.com", false, false },
|
| + {"http://localhost", true, false},
|
| + {"http://bat", true, false},
|
| + {"http://www.example.com", false, true},
|
| + {"http://example.com", false, true},
|
| + {"http://foobar.com", false, true},
|
| + {"http://boo.foobar.com", false, true},
|
| + {"http://baz", true, true},
|
| + {"http://www.exampl.com", false, false},
|
| + {"http://example.org", false, false},
|
| + {"http://foobar.net", false, false},
|
| + {"http://boo.fubar.com", false, false},
|
| };
|
|
|
| } // namespace
|
|
|
| TEST(URLSecurityManager, UseDefaultCredentials) {
|
| - HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist(
|
| - kTestAuthWhitelist);
|
| + HttpAuthFilterWhitelist* auth_filter =
|
| + new HttpAuthFilterWhitelist(kTestAuthWhitelist);
|
| ASSERT_TRUE(auth_filter);
|
| // The URL security manager takes ownership of |auth_filter|.
|
| scoped_ptr<URLSecurityManager> url_security_manager(
|
| @@ -54,8 +54,7 @@ TEST(URLSecurityManager, UseDefaultCredentials) {
|
|
|
| for (size_t i = 0; i < arraysize(kTestDataList); ++i) {
|
| GURL gurl(kTestDataList[i].url);
|
| - bool can_use_default =
|
| - url_security_manager->CanUseDefaultCredentials(gurl);
|
| + bool can_use_default = url_security_manager->CanUseDefaultCredentials(gurl);
|
|
|
| EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_use_default)
|
| << " Run: " << i << " URL: '" << gurl << "'";
|
| @@ -63,8 +62,8 @@ TEST(URLSecurityManager, UseDefaultCredentials) {
|
| }
|
|
|
| TEST(URLSecurityManager, CanDelegate) {
|
| - HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist(
|
| - kTestAuthWhitelist);
|
| + HttpAuthFilterWhitelist* auth_filter =
|
| + new HttpAuthFilterWhitelist(kTestAuthWhitelist);
|
| ASSERT_TRUE(auth_filter);
|
| // The URL security manager takes ownership of |auth_filter|.
|
| scoped_ptr<URLSecurityManager> url_security_manager(
|
| @@ -92,5 +91,4 @@ TEST(URLSecurityManager, CanDelegate_NoWhitelist) {
|
| }
|
| }
|
|
|
| -
|
| } // namespace net
|
|
|