| Index: net/proxy/proxy_script_decider_unittest.cc
|
| diff --git a/net/proxy/proxy_script_decider_unittest.cc b/net/proxy/proxy_script_decider_unittest.cc
|
| index c50b31e4a9124c4731e3e72ff66e5842426afebd..4241c58b95324da960f85fc04a738aef38fa6d46 100644
|
| --- a/net/proxy/proxy_script_decider_unittest.cc
|
| +++ b/net/proxy/proxy_script_decider_unittest.cc
|
| @@ -39,8 +39,7 @@ class Rules {
|
| Rule(const GURL& url, int fetch_error, bool is_valid_script)
|
| : url(url),
|
| fetch_error(fetch_error),
|
| - is_valid_script(is_valid_script) {
|
| - }
|
| + is_valid_script(is_valid_script) {}
|
|
|
| base::string16 text() const {
|
| if (is_valid_script)
|
| @@ -62,8 +61,8 @@ class Rules {
|
| }
|
|
|
| void AddFailDownloadRule(const char* url) {
|
| - rules_.push_back(Rule(GURL(url), kFailedDownloading /*fetch_error*/,
|
| - false));
|
| + rules_.push_back(
|
| + Rule(GURL(url), kFailedDownloading /*fetch_error*/, false));
|
| }
|
|
|
| void AddFailParsingRule(const char* url) {
|
| @@ -149,9 +148,11 @@ class MockDhcpProxyScriptFetcher : public DhcpProxyScriptFetcher {
|
| DISALLOW_COPY_AND_ASSIGN(MockDhcpProxyScriptFetcher);
|
| };
|
|
|
| -MockDhcpProxyScriptFetcher::MockDhcpProxyScriptFetcher() { }
|
| +MockDhcpProxyScriptFetcher::MockDhcpProxyScriptFetcher() {
|
| +}
|
|
|
| -MockDhcpProxyScriptFetcher::~MockDhcpProxyScriptFetcher() { }
|
| +MockDhcpProxyScriptFetcher::~MockDhcpProxyScriptFetcher() {
|
| +}
|
|
|
| int MockDhcpProxyScriptFetcher::Fetch(base::string16* utf16_text,
|
| const CompletionCallback& callback) {
|
| @@ -160,7 +161,8 @@ int MockDhcpProxyScriptFetcher::Fetch(base::string16* utf16_text,
|
| return ERR_IO_PENDING;
|
| }
|
|
|
| -void MockDhcpProxyScriptFetcher::Cancel() { }
|
| +void MockDhcpProxyScriptFetcher::Cancel() {
|
| +}
|
|
|
| const GURL& MockDhcpProxyScriptFetcher::GetPacURL() const {
|
| return gurl_;
|
| @@ -171,7 +173,8 @@ void MockDhcpProxyScriptFetcher::SetPacURL(const GURL& url) {
|
| }
|
|
|
| void MockDhcpProxyScriptFetcher::CompleteRequests(
|
| - int result, const base::string16& script) {
|
| + int result,
|
| + const base::string16& script) {
|
| *utf16_text_ = script;
|
| callback_.Run(result);
|
| }
|
| @@ -190,8 +193,8 @@ TEST(ProxyScriptDeciderTest, CustomPacSucceeds) {
|
| TestCompletionCallback callback;
|
| CapturingNetLog log;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log);
|
| - EXPECT_EQ(OK, decider.Start(
|
| - config, base::TimeDelta(), true, callback.callback()));
|
| + EXPECT_EQ(
|
| + OK, decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(rule.text(), decider.script_data()->utf16());
|
|
|
| // Check the NetLog was filled correctly.
|
| @@ -199,14 +202,14 @@ TEST(ProxyScriptDeciderTest, CustomPacSucceeds) {
|
| log.GetEntries(&entries);
|
|
|
| EXPECT_EQ(4u, entries.size());
|
| - EXPECT_TRUE(LogContainsBeginEvent(
|
| - entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsBeginEvent(entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| EXPECT_TRUE(LogContainsBeginEvent(
|
| entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| EXPECT_TRUE(LogContainsEndEvent(
|
| entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| - EXPECT_TRUE(LogContainsEndEvent(
|
| - entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsEndEvent(entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
|
|
| EXPECT_TRUE(decider.effective_config().has_pac_url());
|
| EXPECT_EQ(config.pac_url(), decider.effective_config().pac_url());
|
| @@ -226,9 +229,9 @@ TEST(ProxyScriptDeciderTest, CustomPacFails1) {
|
| TestCompletionCallback callback;
|
| CapturingNetLog log;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log);
|
| - EXPECT_EQ(kFailedDownloading,
|
| - decider.Start(config, base::TimeDelta(), true,
|
| - callback.callback()));
|
| + EXPECT_EQ(
|
| + kFailedDownloading,
|
| + decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(NULL, decider.script_data());
|
|
|
| // Check the NetLog was filled correctly.
|
| @@ -236,14 +239,14 @@ TEST(ProxyScriptDeciderTest, CustomPacFails1) {
|
| log.GetEntries(&entries);
|
|
|
| EXPECT_EQ(4u, entries.size());
|
| - EXPECT_TRUE(LogContainsBeginEvent(
|
| - entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsBeginEvent(entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| EXPECT_TRUE(LogContainsBeginEvent(
|
| entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| EXPECT_TRUE(LogContainsEndEvent(
|
| entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| - EXPECT_TRUE(LogContainsEndEvent(
|
| - entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsEndEvent(entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
|
|
| EXPECT_FALSE(decider.effective_config().has_pac_url());
|
| }
|
| @@ -261,9 +264,9 @@ TEST(ProxyScriptDeciderTest, CustomPacFails2) {
|
|
|
| TestCompletionCallback callback;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL);
|
| - EXPECT_EQ(kFailedParsing,
|
| - decider.Start(config, base::TimeDelta(), true,
|
| - callback.callback()));
|
| + EXPECT_EQ(
|
| + kFailedParsing,
|
| + decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(NULL, decider.script_data());
|
| }
|
|
|
| @@ -277,9 +280,9 @@ TEST(ProxyScriptDeciderTest, HasNullProxyScriptFetcher) {
|
|
|
| TestCompletionCallback callback;
|
| ProxyScriptDecider decider(NULL, &dhcp_fetcher, NULL);
|
| - EXPECT_EQ(ERR_UNEXPECTED,
|
| - decider.Start(config, base::TimeDelta(), true,
|
| - callback.callback()));
|
| + EXPECT_EQ(
|
| + ERR_UNEXPECTED,
|
| + decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(NULL, decider.script_data());
|
| }
|
|
|
| @@ -296,8 +299,8 @@ TEST(ProxyScriptDeciderTest, AutodetectSuccess) {
|
|
|
| TestCompletionCallback callback;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL);
|
| - EXPECT_EQ(OK, decider.Start(
|
| - config, base::TimeDelta(), true, callback.callback()));
|
| + EXPECT_EQ(
|
| + OK, decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(rule.text(), decider.script_data()->utf16());
|
|
|
| EXPECT_TRUE(decider.effective_config().has_pac_url());
|
| @@ -308,7 +311,7 @@ class ProxyScriptDeciderQuickCheckTest : public ::testing::Test {
|
| public:
|
| ProxyScriptDeciderQuickCheckTest()
|
| : rule_(rules_.AddSuccessRule("http://wpad/wpad.dat")),
|
| - fetcher_(&rules_) { }
|
| + fetcher_(&rules_) {}
|
|
|
| virtual void SetUp() OVERRIDE {
|
| request_context_.set_host_resolver(&resolver_);
|
| @@ -318,8 +321,8 @@ class ProxyScriptDeciderQuickCheckTest : public ::testing::Test {
|
| }
|
|
|
| int StartDecider() {
|
| - return decider_->Start(config_, base::TimeDelta(), true,
|
| - callback_.callback());
|
| + return decider_->Start(
|
| + config_, base::TimeDelta(), true, callback_.callback());
|
| }
|
|
|
| protected:
|
| @@ -390,7 +393,7 @@ TEST_F(ProxyScriptDeciderQuickCheckTest, AsyncTimeout) {
|
| // Fails if DHCP check doesn't take place before QuickCheck.
|
| TEST_F(ProxyScriptDeciderQuickCheckTest, QuickCheckInhibitsDhcp) {
|
| MockDhcpProxyScriptFetcher dhcp_fetcher;
|
| - const char *kPac = "function FindProxyForURL(u,h) { return \"DIRECT\"; }";
|
| + const char* kPac = "function FindProxyForURL(u,h) { return \"DIRECT\"; }";
|
| base::string16 pac_contents = base::UTF8ToUTF16(kPac);
|
| GURL url("http://foobar/baz");
|
| dhcp_fetcher.SetPacURL(url);
|
| @@ -406,7 +409,7 @@ TEST_F(ProxyScriptDeciderQuickCheckTest, QuickCheckInhibitsDhcp) {
|
| // mean a QuickCheck failure, then ensure that our ProxyScriptFetcher is still
|
| // asked to fetch.
|
| TEST_F(ProxyScriptDeciderQuickCheckTest, QuickCheckDisabled) {
|
| - const char *kPac = "function FindProxyForURL(u,h) { return \"DIRECT\"; }";
|
| + const char* kPac = "function FindProxyForURL(u,h) { return \"DIRECT\"; }";
|
| resolver_.set_synchronous_mode(true);
|
| resolver_.rules()->AddSimulatedFailure("wpad");
|
| MockProxyScriptFetcher fetcher;
|
| @@ -417,7 +420,7 @@ TEST_F(ProxyScriptDeciderQuickCheckTest, QuickCheckDisabled) {
|
| }
|
|
|
| TEST_F(ProxyScriptDeciderQuickCheckTest, ExplicitPacUrl) {
|
| - const char *kCustomUrl = "http://custom/proxy.pac";
|
| + const char* kCustomUrl = "http://custom/proxy.pac";
|
| config_.set_pac_url(GURL(kCustomUrl));
|
| Rules::Rule rule = rules_.AddSuccessRule(kCustomUrl);
|
| resolver_.rules()->AddSimulatedFailure("wpad");
|
| @@ -443,8 +446,8 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess1) {
|
|
|
| TestCompletionCallback callback;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL);
|
| - EXPECT_EQ(OK, decider.Start(
|
| - config, base::TimeDelta(), true, callback.callback()));
|
| + EXPECT_EQ(
|
| + OK, decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(rule.text(), decider.script_data()->utf16());
|
|
|
| EXPECT_TRUE(decider.effective_config().has_pac_url());
|
| @@ -470,8 +473,8 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess2) {
|
| CapturingNetLog log;
|
|
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log);
|
| - EXPECT_EQ(OK, decider.Start(config, base::TimeDelta(),
|
| - true, callback.callback()));
|
| + EXPECT_EQ(
|
| + OK, decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(rule.text(), decider.script_data()->utf16());
|
|
|
| // Verify that the effective configuration no longer contains auto detect or
|
| @@ -486,8 +489,8 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess2) {
|
| log.GetEntries(&entries);
|
|
|
| EXPECT_EQ(10u, entries.size());
|
| - EXPECT_TRUE(LogContainsBeginEvent(
|
| - entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsBeginEvent(entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| // This is the DHCP phase, which fails fetching rather than parsing, so
|
| // there is no pair of SET_PAC_SCRIPT events.
|
| EXPECT_TRUE(LogContainsBeginEvent(
|
| @@ -495,7 +498,8 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess2) {
|
| EXPECT_TRUE(LogContainsEndEvent(
|
| entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| EXPECT_TRUE(LogContainsEvent(
|
| - entries, 3,
|
| + entries,
|
| + 3,
|
| NetLog::TYPE_PROXY_SCRIPT_DECIDER_FALLING_BACK_TO_NEXT_PAC_SOURCE,
|
| NetLog::PHASE_NONE));
|
| // This is the DNS phase, which attempts a fetch but fails.
|
| @@ -504,7 +508,8 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess2) {
|
| EXPECT_TRUE(LogContainsEndEvent(
|
| entries, 5, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| EXPECT_TRUE(LogContainsEvent(
|
| - entries, 6,
|
| + entries,
|
| + 6,
|
| NetLog::TYPE_PROXY_SCRIPT_DECIDER_FALLING_BACK_TO_NEXT_PAC_SOURCE,
|
| NetLog::PHASE_NONE));
|
| // Finally, the custom PAC URL phase.
|
| @@ -512,8 +517,8 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomSuccess2) {
|
| entries, 7, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| EXPECT_TRUE(LogContainsEndEvent(
|
| entries, 8, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| - EXPECT_TRUE(LogContainsEndEvent(
|
| - entries, 9, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsEndEvent(entries, 9, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| }
|
|
|
| // Fails at WPAD (downloading), and fails at custom PAC (downloading).
|
| @@ -531,9 +536,9 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomFails1) {
|
|
|
| TestCompletionCallback callback;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL);
|
| - EXPECT_EQ(kFailedDownloading,
|
| - decider.Start(config, base::TimeDelta(), true,
|
| - callback.callback()));
|
| + EXPECT_EQ(
|
| + kFailedDownloading,
|
| + decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(NULL, decider.script_data());
|
| }
|
|
|
| @@ -552,9 +557,9 @@ TEST(ProxyScriptDeciderTest, AutodetectFailCustomFails2) {
|
|
|
| TestCompletionCallback callback;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL);
|
| - EXPECT_EQ(kFailedParsing,
|
| - decider.Start(config, base::TimeDelta(), true,
|
| - callback.callback()));
|
| + EXPECT_EQ(
|
| + kFailedParsing,
|
| + decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(NULL, decider.script_data());
|
| }
|
|
|
| @@ -575,8 +580,10 @@ TEST(ProxyScriptDeciderTest, CustomPacFails1_WithPositiveDelay) {
|
| CapturingNetLog log;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log);
|
| EXPECT_EQ(ERR_IO_PENDING,
|
| - decider.Start(config, base::TimeDelta::FromMilliseconds(1),
|
| - true, callback.callback()));
|
| + decider.Start(config,
|
| + base::TimeDelta::FromMilliseconds(1),
|
| + true,
|
| + callback.callback()));
|
|
|
| EXPECT_EQ(kFailedDownloading, callback.WaitForResult());
|
| EXPECT_EQ(NULL, decider.script_data());
|
| @@ -586,18 +593,18 @@ TEST(ProxyScriptDeciderTest, CustomPacFails1_WithPositiveDelay) {
|
| log.GetEntries(&entries);
|
|
|
| EXPECT_EQ(6u, entries.size());
|
| - EXPECT_TRUE(LogContainsBeginEvent(
|
| - entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsBeginEvent(entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| EXPECT_TRUE(LogContainsBeginEvent(
|
| entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_WAIT));
|
| - EXPECT_TRUE(LogContainsEndEvent(
|
| - entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_WAIT));
|
| + EXPECT_TRUE(
|
| + LogContainsEndEvent(entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_WAIT));
|
| EXPECT_TRUE(LogContainsBeginEvent(
|
| entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| EXPECT_TRUE(LogContainsEndEvent(
|
| entries, 4, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| - EXPECT_TRUE(LogContainsEndEvent(
|
| - entries, 5, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsEndEvent(entries, 5, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| }
|
|
|
| // This is a copy-paste of CustomPacFails1, with the exception that we give it
|
| @@ -616,9 +623,10 @@ TEST(ProxyScriptDeciderTest, CustomPacFails1_WithNegativeDelay) {
|
| TestCompletionCallback callback;
|
| CapturingNetLog log;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, &log);
|
| - EXPECT_EQ(kFailedDownloading,
|
| - decider.Start(config, base::TimeDelta::FromSeconds(-5),
|
| - true, callback.callback()));
|
| + EXPECT_EQ(
|
| + kFailedDownloading,
|
| + decider.Start(
|
| + config, base::TimeDelta::FromSeconds(-5), true, callback.callback()));
|
| EXPECT_EQ(NULL, decider.script_data());
|
|
|
| // Check the NetLog was filled correctly.
|
| @@ -626,21 +634,20 @@ TEST(ProxyScriptDeciderTest, CustomPacFails1_WithNegativeDelay) {
|
| log.GetEntries(&entries);
|
|
|
| EXPECT_EQ(4u, entries.size());
|
| - EXPECT_TRUE(LogContainsBeginEvent(
|
| - entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsBeginEvent(entries, 0, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| EXPECT_TRUE(LogContainsBeginEvent(
|
| entries, 1, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| EXPECT_TRUE(LogContainsEndEvent(
|
| entries, 2, NetLog::TYPE_PROXY_SCRIPT_DECIDER_FETCH_PAC_SCRIPT));
|
| - EXPECT_TRUE(LogContainsEndEvent(
|
| - entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| + EXPECT_TRUE(
|
| + LogContainsEndEvent(entries, 3, NetLog::TYPE_PROXY_SCRIPT_DECIDER));
|
| }
|
|
|
| class SynchronousSuccessDhcpFetcher : public DhcpProxyScriptFetcher {
|
| public:
|
| explicit SynchronousSuccessDhcpFetcher(const base::string16& expected_text)
|
| - : gurl_("http://dhcppac/"), expected_text_(expected_text) {
|
| - }
|
| + : gurl_("http://dhcppac/"), expected_text_(expected_text) {}
|
|
|
| virtual int Fetch(base::string16* utf16_text,
|
| const CompletionCallback& callback) OVERRIDE {
|
| @@ -648,16 +655,11 @@ class SynchronousSuccessDhcpFetcher : public DhcpProxyScriptFetcher {
|
| return OK;
|
| }
|
|
|
| - virtual void Cancel() OVERRIDE {
|
| - }
|
| + virtual void Cancel() OVERRIDE {}
|
|
|
| - virtual const GURL& GetPacURL() const OVERRIDE {
|
| - return gurl_;
|
| - }
|
| + virtual const GURL& GetPacURL() const OVERRIDE { return gurl_; }
|
|
|
| - const base::string16& expected_text() const {
|
| - return expected_text_;
|
| - }
|
| + const base::string16& expected_text() const { return expected_text_; }
|
|
|
| private:
|
| GURL gurl_;
|
| @@ -685,10 +687,9 @@ TEST(ProxyScriptDeciderTest, AutodetectDhcpSuccess) {
|
|
|
| TestCompletionCallback callback;
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL);
|
| - EXPECT_EQ(OK, decider.Start(
|
| - config, base::TimeDelta(), true, callback.callback()));
|
| - EXPECT_EQ(dhcp_fetcher.expected_text(),
|
| - decider.script_data()->utf16());
|
| + EXPECT_EQ(
|
| + OK, decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| + EXPECT_EQ(dhcp_fetcher.expected_text(), decider.script_data()->utf16());
|
|
|
| EXPECT_TRUE(decider.effective_config().has_pac_url());
|
| EXPECT_EQ(GURL("http://dhcppac/"), decider.effective_config().pac_url());
|
| @@ -710,7 +711,8 @@ TEST(ProxyScriptDeciderTest, AutodetectDhcpFailParse) {
|
| ProxyScriptDecider decider(&fetcher, &dhcp_fetcher, NULL);
|
| // Since there is fallback to DNS-based WPAD, the final error will be that
|
| // it failed downloading, not that it failed parsing.
|
| - EXPECT_EQ(kFailedDownloading,
|
| + EXPECT_EQ(
|
| + kFailedDownloading,
|
| decider.Start(config, base::TimeDelta(), true, callback.callback()));
|
| EXPECT_EQ(NULL, decider.script_data());
|
|
|
| @@ -733,13 +735,9 @@ class AsyncFailDhcpFetcher
|
| return ERR_IO_PENDING;
|
| }
|
|
|
| - virtual void Cancel() OVERRIDE {
|
| - callback_.Reset();
|
| - }
|
| + virtual void Cancel() OVERRIDE { callback_.Reset(); }
|
|
|
| - virtual const GURL& GetPacURL() const OVERRIDE {
|
| - return dummy_gurl_;
|
| - }
|
| + virtual const GURL& GetPacURL() const OVERRIDE { return dummy_gurl_; }
|
|
|
| void CallbackWithFailure() {
|
| if (!callback_.is_null())
|
|
|