Index: net/proxy/proxy_config_service_common_unittest.cc |
diff --git a/net/proxy/proxy_config_service_common_unittest.cc b/net/proxy/proxy_config_service_common_unittest.cc |
deleted file mode 100644 |
index 3835bb1ad201f745943395552d625f1c9d033938..0000000000000000000000000000000000000000 |
--- a/net/proxy/proxy_config_service_common_unittest.cc |
+++ /dev/null |
@@ -1,191 +0,0 @@ |
-// Copyright (c) 2009 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/proxy/proxy_config_service_common_unittest.h" |
- |
-#include <string> |
-#include <vector> |
- |
-#include "net/proxy/proxy_config.h" |
- |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-namespace net { |
- |
-namespace { |
- |
-// Helper to verify that |expected_proxy| matches the first proxy conatined in |
-// |actual_proxies|, and that |actual_proxies| contains exactly one proxy. If |
-// either condition is untrue, then |*did_fail| is set to true, and |
-// |*failure_details| is filled with a description of the failure. |
-void MatchesProxyServerHelper(const char* failure_message, |
- const char* expected_proxy, |
- const ProxyList& actual_proxies, |
- ::testing::AssertionResult* failure_details, |
- bool* did_fail) { |
- // If |expected_proxy| is empty, then we expect |actual_proxies| to be so as |
- // well. |
- if (strlen(expected_proxy) == 0) { |
- if (!actual_proxies.IsEmpty()) { |
- *did_fail = true; |
- *failure_details |
- << failure_message << ". Was expecting no proxies but got " |
- << actual_proxies.size() << "."; |
- } |
- return; |
- } |
- |
- // Otherwise we check that |actual_proxies| holds a single matching proxy. |
- if (actual_proxies.size() != 1) { |
- *did_fail = true; |
- *failure_details |
- << failure_message << ". Was expecting exactly one proxy but got " |
- << actual_proxies.size() << "."; |
- return; |
- } |
- |
- ProxyServer actual_proxy = actual_proxies.Get(); |
- std::string actual_proxy_string; |
- if (actual_proxy.is_valid()) |
- actual_proxy_string = actual_proxy.ToURI(); |
- |
- if (std::string(expected_proxy) != actual_proxy_string) { |
- *failure_details |
- << failure_message << ". Was expecting: \"" << expected_proxy |
- << "\" but got: \"" << actual_proxy_string << "\""; |
- *did_fail = true; |
- } |
-} |
- |
-std::string FlattenProxyBypass(const ProxyBypassRules& bypass_rules) { |
- std::string flattened_proxy_bypass; |
- for (ProxyBypassRules::RuleList::const_iterator it = |
- bypass_rules.rules().begin(); |
- it != bypass_rules.rules().end(); ++it) { |
- if (!flattened_proxy_bypass.empty()) |
- flattened_proxy_bypass += ","; |
- flattened_proxy_bypass += (*it)->ToString(); |
- } |
- return flattened_proxy_bypass; |
-} |
- |
-} // namespace |
- |
-ProxyRulesExpectation::ProxyRulesExpectation( |
- ProxyConfig::ProxyRules::Type type, |
- const char* single_proxy, |
- const char* proxy_for_http, |
- const char* proxy_for_https, |
- const char* proxy_for_ftp, |
- const char* fallback_proxy, |
- const char* flattened_bypass_rules, |
- bool reverse_bypass) |
- : type(type), |
- single_proxy(single_proxy), |
- proxy_for_http(proxy_for_http), |
- proxy_for_https(proxy_for_https), |
- proxy_for_ftp(proxy_for_ftp), |
- fallback_proxy(fallback_proxy), |
- flattened_bypass_rules(flattened_bypass_rules), |
- reverse_bypass(reverse_bypass) { |
-} |
- |
- |
-::testing::AssertionResult ProxyRulesExpectation::Matches( |
- const ProxyConfig::ProxyRules& rules) const { |
- ::testing::AssertionResult failure_details = ::testing::AssertionFailure(); |
- bool failed = false; |
- |
- if (rules.type != type) { |
- failure_details << "Type mismatch. Expected: " |
- << type << " but was: " << rules.type; |
- failed = true; |
- } |
- |
- MatchesProxyServerHelper("Bad single_proxy", single_proxy, |
- rules.single_proxies, &failure_details, &failed); |
- MatchesProxyServerHelper("Bad proxy_for_http", proxy_for_http, |
- rules.proxies_for_http, &failure_details, |
- &failed); |
- MatchesProxyServerHelper("Bad proxy_for_https", proxy_for_https, |
- rules.proxies_for_https, &failure_details, |
- &failed); |
- MatchesProxyServerHelper("Bad fallback_proxy", fallback_proxy, |
- rules.fallback_proxies, &failure_details, &failed); |
- |
- std::string actual_flattened_bypass = FlattenProxyBypass(rules.bypass_rules); |
- if (std::string(flattened_bypass_rules) != actual_flattened_bypass) { |
- failure_details |
- << "Bad bypass rules. Expected: \"" << flattened_bypass_rules |
- << "\" but got: \"" << actual_flattened_bypass << "\""; |
- failed = true; |
- } |
- |
- if (rules.reverse_bypass != reverse_bypass) { |
- failure_details << "Bad reverse_bypass. Expected: " << reverse_bypass |
- << " but got: " << rules.reverse_bypass; |
- failed = true; |
- } |
- |
- return failed ? failure_details : ::testing::AssertionSuccess(); |
-} |
- |
-// static |
-ProxyRulesExpectation ProxyRulesExpectation::Empty() { |
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_NO_RULES, |
- "", "", "", "", "", "", false); |
-} |
- |
-// static |
-ProxyRulesExpectation ProxyRulesExpectation::EmptyWithBypass( |
- const char* flattened_bypass_rules) { |
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_NO_RULES, |
- "", "", "", "", "", flattened_bypass_rules, |
- false); |
-} |
- |
-// static |
-ProxyRulesExpectation ProxyRulesExpectation::Single( |
- const char* single_proxy, |
- const char* flattened_bypass_rules) { |
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_SINGLE_PROXY, |
- single_proxy, "", "", "", "", |
- flattened_bypass_rules, false); |
-} |
- |
-// static |
-ProxyRulesExpectation ProxyRulesExpectation::PerScheme( |
- const char* proxy_http, |
- const char* proxy_https, |
- const char* proxy_ftp, |
- const char* flattened_bypass_rules) { |
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME, |
- "", proxy_http, proxy_https, proxy_ftp, "", |
- flattened_bypass_rules, false); |
-} |
- |
-// static |
-ProxyRulesExpectation ProxyRulesExpectation::PerSchemeWithSocks( |
- const char* proxy_http, |
- const char* proxy_https, |
- const char* proxy_ftp, |
- const char* socks_proxy, |
- const char* flattened_bypass_rules) { |
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME, |
- "", proxy_http, proxy_https, proxy_ftp, |
- socks_proxy, flattened_bypass_rules, false); |
-} |
- |
-// static |
-ProxyRulesExpectation ProxyRulesExpectation::PerSchemeWithBypassReversed( |
- const char* proxy_http, |
- const char* proxy_https, |
- const char* proxy_ftp, |
- const char* flattened_bypass_rules) { |
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME, |
- "", proxy_http, proxy_https, proxy_ftp, "", |
- flattened_bypass_rules, true); |
-} |
- |
-} // namespace net |