Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(547)

Unified Diff: components/password_manager/core/browser/affiliation_utils_unittest.cc

Issue 771173002: Added utility functions related to working with "facets". (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix Android compile errors. Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « components/password_manager/core/browser/affiliation_utils.cc ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/password_manager/core/browser/affiliation_utils_unittest.cc
diff --git a/components/password_manager/core/browser/affiliation_utils_unittest.cc b/components/password_manager/core/browser/affiliation_utils_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..3af672f6fb19bd6838ed3d4236e61c7cc1271faf
--- /dev/null
+++ b/components/password_manager/core/browser/affiliation_utils_unittest.cc
@@ -0,0 +1,180 @@
+// Copyright 2014 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "components/password_manager/core/browser/affiliation_utils.h"
+
+#include "testing/gtest/include/gtest/gtest.h"
+
+namespace password_manager {
+
+namespace {
+const char kTestFacetURI1[] = "https://alpha.example.com/";
+const char kTestFacetURI2[] = "https://beta.example.com/";
+const char kTestFacetURI3[] = "https://gamma.example.com/";
+} // namespace
+
+TEST(AffiliationUtilsTest, ValidWebFacetURIs) {
+ struct {
+ const char* valid_facet_uri;
+ const char* expected_canonical_facet_uri;
+ } kTestCases[] = {
+ {"https://www.example.com", "https://www.example.com"},
+ {"HTTPS://www.EXAMPLE.com", "https://www.example.com"},
+ {"https://0321.0x86.161.0043", "https://209.134.161.35"},
+ {"https://www.%65xample.com", "https://www.example.com"},
+ {"https://sz\xc3\xb3t\xc3\xa1r.example.com",
+ "https://xn--sztr-7na0i.example.com"},
+ {"https://www.example.com/", "https://www.example.com"},
+ {"https://www.example.com:", "https://www.example.com"},
+ {"https://@www.example.com", "https://www.example.com"},
+ {"https://:@www.example.com", "https://www.example.com"},
+ {"https://www.example.com:8080", "https://www.example.com:8080"},
+ {"https://new-gtld", "https://new-gtld"}};
+ for (const auto& test_case : kTestCases) {
+ SCOPED_TRACE(testing::Message("URI = ") << test_case.valid_facet_uri);
+ FacetURI facet_uri =
+ FacetURI::FromPotentiallyInvalidSpec(test_case.valid_facet_uri);
+ ASSERT_TRUE(facet_uri.IsValidWebFacetURI());
+ EXPECT_EQ(std::string(test_case.expected_canonical_facet_uri),
+ facet_uri.canonical_spec());
+ }
+}
+
+TEST(AffiliationUtilsTest, InvalidWebFacetURIs) {
+ const char* kInvalidFacetURIs[]{
+ // Invalid URL (actually, will be treated as having only a host part).
+ "Does not look like a valid URL.",
+ // Path is more than just the root path ('/').
+ "https://www.example.com/path",
+ // Empty scheme and not HTTPS scheme.
+ "://www.example.com",
+ "http://www.example.com/",
+ // Forbidden non-empty components.
+ "https://user@www.example.com/",
+ "https://:password@www.example.com/",
+ "https://www.example.com/?",
+ "https://www.example.com/?query",
+ "https://www.example.com/#",
+ "https://www.example.com/#ref",
+ // Valid Android facet URI.
+ "android://hash@com.example.android"};
+ for (const char* uri : kInvalidFacetURIs) {
+ SCOPED_TRACE(testing::Message("URI = ") << uri);
+ FacetURI facet_uri = FacetURI::FromPotentiallyInvalidSpec(uri);
+ EXPECT_FALSE(facet_uri.IsValidWebFacetURI());
+ }
+}
+
+TEST(AffiliationUtilsTest, ValidAndroidFacetURIs) {
+ struct {
+ const char* valid_facet_uri;
+ const char* expected_canonical_facet_uri;
+ } kTestCases[] = {
+ {"android://"
+ "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_"
+ "@com.example.android",
+ "android://"
+ "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_"
+ "@com.example.android"},
+ {"ANDROID://"
+ "hash@abcdefghijklmnopqrstuvwxyz_0123456789.ABCDEFGHIJKLMNOPQRSTUVWXYZ",
+ "android://"
+ "hash@abcdefghijklmnopqrstuvwxyz_0123456789.ABCDEFGHIJKLMNOPQRSTUVWXYZ"},
+ {"android://needpadding@com.example.android",
+ "android://needpadding=@com.example.android"},
+ {"android://needtounescape%3D%3D@com.%65xample.android",
+ "android://needtounescape==@com.example.android"},
+ {"ANDROID://hash@com.example.android",
+ "android://hash@com.example.android"},
+ {"android://hash@com.example.android/",
+ "android://hash@com.example.android"},
+ {"android://hash:@com.example.android",
+ "android://hash@com.example.android"}};
+ for (const auto& test_case : kTestCases) {
+ SCOPED_TRACE(testing::Message("URI = ") << test_case.valid_facet_uri);
+ FacetURI facet_uri =
+ FacetURI::FromPotentiallyInvalidSpec(test_case.valid_facet_uri);
+ ASSERT_TRUE(facet_uri.IsValidAndroidFacetURI());
+ EXPECT_EQ(test_case.expected_canonical_facet_uri,
+ facet_uri.canonical_spec());
+ }
+}
+
+TEST(AffiliationUtilsTest, InvalidAndroidFacetURIs) {
+ const char* kInvalidFacetURIs[]{
+ // Invalid URL (actually, will be treated as having only a host part).
+ "Does not look like a valid URL.",
+ // Path is more than just the root path ('/').
+ "android://hash@com.example.android/path",
+ // Empty scheme or not "android" scheme.
+ "://hash@com.example.android",
+ "http://hash@com.example.android",
+ // Package name with illegal characters.
+ "android://hash@com.$example.android",
+ "android://hash@com-example-android",
+ "android://hash@com%2Dexample.android", // Escaped '-'.
+ "android://hash@com.example.sz\xc3\xb3t\xc3\xa1r", // UTF-8 o' and a'.
+ // Empty, non-existent and malformed hash part.
+ "android://@com.example.android",
+ "android://com.example.android",
+ "android://badpadding=a@com.example.android",
+ "android://toolongpaddin===@com.example.android",
+ "android://invalid+characters@com.example.android",
+ "android://invalid%2Fcharacters@com.example.android", // Escaped '/'.
+ // Forbidden non-empty components.
+ "android://hash:password@com.example.android",
+ "android://hash@com.example.android:port",
+ "android://hash@com.example.android/?",
+ "android://hash@com.example.android/?query",
+ "android://hash@com.example.android/#",
+ "android://hash@com.example.android/#ref",
+ // Valid Web facet URI.
+ "https://www.example.com/"};
+ for (const char* uri : kInvalidFacetURIs) {
+ SCOPED_TRACE(testing::Message("URI = ") << uri);
+ FacetURI facet_uri = FacetURI::FromPotentiallyInvalidSpec(uri);
+ EXPECT_FALSE(facet_uri.IsValidAndroidFacetURI());
+ }
+}
+
+TEST(AffiliationUtilsTest, EqualEquivalenceClasses) {
+ AffiliatedFacets a;
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI1));
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI2));
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI3));
+
+ AffiliatedFacets b;
+ b.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI3));
+ b.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI1));
+ b.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI2));
+
+ EXPECT_TRUE(AreEquivalenceClassesEqual(a, a));
+ EXPECT_TRUE(AreEquivalenceClassesEqual(b, b));
+ EXPECT_TRUE(AreEquivalenceClassesEqual(b, a));
+ EXPECT_TRUE(AreEquivalenceClassesEqual(a, b));
+}
+
+TEST(AffiliationUtilsTest, NotEqualEquivalenceClasses) {
+ AffiliatedFacets a;
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI1));
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI2));
+
+ AffiliatedFacets b;
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI2));
+ b.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI3));
+
+ AffiliatedFacets c;
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI1));
+ a.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI2));
+ b.push_back(FacetURI::FromCanonicalSpec(kTestFacetURI3));
+
+ EXPECT_FALSE(AreEquivalenceClassesEqual(a, b));
+ EXPECT_FALSE(AreEquivalenceClassesEqual(a, c));
+ EXPECT_FALSE(AreEquivalenceClassesEqual(b, a));
+ EXPECT_FALSE(AreEquivalenceClassesEqual(b, c));
+ EXPECT_FALSE(AreEquivalenceClassesEqual(c, a));
+ EXPECT_FALSE(AreEquivalenceClassesEqual(c, b));
+}
+
+} // namespace password_manager
« no previous file with comments | « components/password_manager/core/browser/affiliation_utils.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698