| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2013 Google Inc. All rights reserved. | 2 * Copyright (C) 2013 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 121 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 132 {"http", "", "http://beispiel.de/", OriginAccessEntry::MatchesOrigin, | 132 {"http", "", "http://beispiel.de/", OriginAccessEntry::MatchesOrigin, |
| 133 OriginAccessEntry::MatchesOrigin}, | 133 OriginAccessEntry::MatchesOrigin}, |
| 134 {"https", "", "http://beispiel.de/", | 134 {"https", "", "http://beispiel.de/", |
| 135 OriginAccessEntry::DoesNotMatchOrigin, OriginAccessEntry::MatchesOrigin}, | 135 OriginAccessEntry::DoesNotMatchOrigin, OriginAccessEntry::MatchesOrigin}, |
| 136 }; | 136 }; |
| 137 | 137 |
| 138 ScopedTestingPlatformSupport<OriginAccessEntryTestPlatform> platform; | 138 ScopedTestingPlatformSupport<OriginAccessEntryTestPlatform> platform; |
| 139 platform->setPublicSuffix("com"); | 139 platform->setPublicSuffix("com"); |
| 140 | 140 |
| 141 for (const auto& test : inputs) { | 141 for (const auto& test : inputs) { |
| 142 SCOPED_TRACE(testing::Message() << "Host: " << test.host | 142 SCOPED_TRACE(testing::Message() |
| 143 << ", Origin: " << test.origin); | 143 << "Host: " << test.host << ", Origin: " << test.origin); |
| 144 RefPtr<SecurityOrigin> originToTest = | 144 RefPtr<SecurityOrigin> originToTest = |
| 145 SecurityOrigin::createFromString(test.origin); | 145 SecurityOrigin::createFromString(test.origin); |
| 146 OriginAccessEntry entry1(test.protocol, test.host, | 146 OriginAccessEntry entry1(test.protocol, test.host, |
| 147 OriginAccessEntry::AllowSubdomains); | 147 OriginAccessEntry::AllowSubdomains); |
| 148 EXPECT_EQ(test.expectedOrigin, entry1.matchesOrigin(*originToTest)); | 148 EXPECT_EQ(test.expectedOrigin, entry1.matchesOrigin(*originToTest)); |
| 149 EXPECT_EQ(test.expectedDomain, entry1.matchesDomain(*originToTest)); | 149 EXPECT_EQ(test.expectedDomain, entry1.matchesDomain(*originToTest)); |
| 150 } | 150 } |
| 151 } | 151 } |
| 152 | 152 |
| 153 TEST(OriginAccessEntryTest, AllowRegisterableDomainsTest) { | 153 TEST(OriginAccessEntryTest, AllowRegisterableDomainsTest) { |
| (...skipping 139 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 293 {"http", "", "http://beispiel.de/", | 293 {"http", "", "http://beispiel.de/", |
| 294 OriginAccessEntry::DoesNotMatchOrigin}, | 294 OriginAccessEntry::DoesNotMatchOrigin}, |
| 295 {"https", "", "http://beispiel.de/", | 295 {"https", "", "http://beispiel.de/", |
| 296 OriginAccessEntry::DoesNotMatchOrigin}, | 296 OriginAccessEntry::DoesNotMatchOrigin}, |
| 297 }; | 297 }; |
| 298 | 298 |
| 299 ScopedTestingPlatformSupport<OriginAccessEntryTestPlatform> platform; | 299 ScopedTestingPlatformSupport<OriginAccessEntryTestPlatform> platform; |
| 300 platform->setPublicSuffix("com"); | 300 platform->setPublicSuffix("com"); |
| 301 | 301 |
| 302 for (const auto& test : inputs) { | 302 for (const auto& test : inputs) { |
| 303 SCOPED_TRACE(testing::Message() << "Host: " << test.host | 303 SCOPED_TRACE(testing::Message() |
| 304 << ", Origin: " << test.origin); | 304 << "Host: " << test.host << ", Origin: " << test.origin); |
| 305 RefPtr<SecurityOrigin> originToTest = | 305 RefPtr<SecurityOrigin> originToTest = |
| 306 SecurityOrigin::createFromString(test.origin); | 306 SecurityOrigin::createFromString(test.origin); |
| 307 OriginAccessEntry entry1(test.protocol, test.host, | 307 OriginAccessEntry entry1(test.protocol, test.host, |
| 308 OriginAccessEntry::DisallowSubdomains); | 308 OriginAccessEntry::DisallowSubdomains); |
| 309 EXPECT_EQ(test.expected, entry1.matchesOrigin(*originToTest)); | 309 EXPECT_EQ(test.expected, entry1.matchesOrigin(*originToTest)); |
| 310 } | 310 } |
| 311 } | 311 } |
| 312 | 312 |
| 313 TEST(OriginAccessEntryTest, IPAddressTest) { | 313 TEST(OriginAccessEntryTest, IPAddressTest) { |
| 314 struct TestCase { | 314 struct TestCase { |
| (...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 352 {"http", "0.123", "http://192.0.0.123/", | 352 {"http", "0.123", "http://192.0.0.123/", |
| 353 OriginAccessEntry::DoesNotMatchOrigin}, | 353 OriginAccessEntry::DoesNotMatchOrigin}, |
| 354 {"http", "1.123", "http://192.0.0.123/", | 354 {"http", "1.123", "http://192.0.0.123/", |
| 355 OriginAccessEntry::DoesNotMatchOrigin}, | 355 OriginAccessEntry::DoesNotMatchOrigin}, |
| 356 }; | 356 }; |
| 357 | 357 |
| 358 ScopedTestingPlatformSupport<OriginAccessEntryTestPlatform> platform; | 358 ScopedTestingPlatformSupport<OriginAccessEntryTestPlatform> platform; |
| 359 platform->setPublicSuffix("com"); | 359 platform->setPublicSuffix("com"); |
| 360 | 360 |
| 361 for (const auto& test : inputs) { | 361 for (const auto& test : inputs) { |
| 362 SCOPED_TRACE(testing::Message() << "Host: " << test.host | 362 SCOPED_TRACE(testing::Message() |
| 363 << ", Origin: " << test.origin); | 363 << "Host: " << test.host << ", Origin: " << test.origin); |
| 364 RefPtr<SecurityOrigin> originToTest = | 364 RefPtr<SecurityOrigin> originToTest = |
| 365 SecurityOrigin::createFromString(test.origin); | 365 SecurityOrigin::createFromString(test.origin); |
| 366 OriginAccessEntry entry1(test.protocol, test.host, | 366 OriginAccessEntry entry1(test.protocol, test.host, |
| 367 OriginAccessEntry::AllowSubdomains); | 367 OriginAccessEntry::AllowSubdomains); |
| 368 EXPECT_EQ(test.expected, entry1.matchesOrigin(*originToTest)); | 368 EXPECT_EQ(test.expected, entry1.matchesOrigin(*originToTest)); |
| 369 | 369 |
| 370 OriginAccessEntry entry2(test.protocol, test.host, | 370 OriginAccessEntry entry2(test.protocol, test.host, |
| 371 OriginAccessEntry::DisallowSubdomains); | 371 OriginAccessEntry::DisallowSubdomains); |
| 372 EXPECT_EQ(test.expected, entry2.matchesOrigin(*originToTest)); | 372 EXPECT_EQ(test.expected, entry2.matchesOrigin(*originToTest)); |
| 373 } | 373 } |
| 374 } | 374 } |
| 375 | 375 |
| 376 } // namespace blink | 376 } // namespace blink |
| OLD | NEW |