Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(2507)

Unified Diff: net/proxy/proxy_config_service_common_unittest.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/proxy/proxy_config_service_common_unittest.h ('k') | net/proxy/proxy_config_service_fixed.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/proxy/proxy_config_service_common_unittest.cc
diff --git a/net/proxy/proxy_config_service_common_unittest.cc b/net/proxy/proxy_config_service_common_unittest.cc
deleted file mode 100644
index 3835bb1ad201f745943395552d625f1c9d033938..0000000000000000000000000000000000000000
--- a/net/proxy/proxy_config_service_common_unittest.cc
+++ /dev/null
@@ -1,191 +0,0 @@
-// Copyright (c) 2009 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "net/proxy/proxy_config_service_common_unittest.h"
-
-#include <string>
-#include <vector>
-
-#include "net/proxy/proxy_config.h"
-
-#include "testing/gtest/include/gtest/gtest.h"
-
-namespace net {
-
-namespace {
-
-// Helper to verify that |expected_proxy| matches the first proxy conatined in
-// |actual_proxies|, and that |actual_proxies| contains exactly one proxy. If
-// either condition is untrue, then |*did_fail| is set to true, and
-// |*failure_details| is filled with a description of the failure.
-void MatchesProxyServerHelper(const char* failure_message,
- const char* expected_proxy,
- const ProxyList& actual_proxies,
- ::testing::AssertionResult* failure_details,
- bool* did_fail) {
- // If |expected_proxy| is empty, then we expect |actual_proxies| to be so as
- // well.
- if (strlen(expected_proxy) == 0) {
- if (!actual_proxies.IsEmpty()) {
- *did_fail = true;
- *failure_details
- << failure_message << ". Was expecting no proxies but got "
- << actual_proxies.size() << ".";
- }
- return;
- }
-
- // Otherwise we check that |actual_proxies| holds a single matching proxy.
- if (actual_proxies.size() != 1) {
- *did_fail = true;
- *failure_details
- << failure_message << ". Was expecting exactly one proxy but got "
- << actual_proxies.size() << ".";
- return;
- }
-
- ProxyServer actual_proxy = actual_proxies.Get();
- std::string actual_proxy_string;
- if (actual_proxy.is_valid())
- actual_proxy_string = actual_proxy.ToURI();
-
- if (std::string(expected_proxy) != actual_proxy_string) {
- *failure_details
- << failure_message << ". Was expecting: \"" << expected_proxy
- << "\" but got: \"" << actual_proxy_string << "\"";
- *did_fail = true;
- }
-}
-
-std::string FlattenProxyBypass(const ProxyBypassRules& bypass_rules) {
- std::string flattened_proxy_bypass;
- for (ProxyBypassRules::RuleList::const_iterator it =
- bypass_rules.rules().begin();
- it != bypass_rules.rules().end(); ++it) {
- if (!flattened_proxy_bypass.empty())
- flattened_proxy_bypass += ",";
- flattened_proxy_bypass += (*it)->ToString();
- }
- return flattened_proxy_bypass;
-}
-
-} // namespace
-
-ProxyRulesExpectation::ProxyRulesExpectation(
- ProxyConfig::ProxyRules::Type type,
- const char* single_proxy,
- const char* proxy_for_http,
- const char* proxy_for_https,
- const char* proxy_for_ftp,
- const char* fallback_proxy,
- const char* flattened_bypass_rules,
- bool reverse_bypass)
- : type(type),
- single_proxy(single_proxy),
- proxy_for_http(proxy_for_http),
- proxy_for_https(proxy_for_https),
- proxy_for_ftp(proxy_for_ftp),
- fallback_proxy(fallback_proxy),
- flattened_bypass_rules(flattened_bypass_rules),
- reverse_bypass(reverse_bypass) {
-}
-
-
-::testing::AssertionResult ProxyRulesExpectation::Matches(
- const ProxyConfig::ProxyRules& rules) const {
- ::testing::AssertionResult failure_details = ::testing::AssertionFailure();
- bool failed = false;
-
- if (rules.type != type) {
- failure_details << "Type mismatch. Expected: "
- << type << " but was: " << rules.type;
- failed = true;
- }
-
- MatchesProxyServerHelper("Bad single_proxy", single_proxy,
- rules.single_proxies, &failure_details, &failed);
- MatchesProxyServerHelper("Bad proxy_for_http", proxy_for_http,
- rules.proxies_for_http, &failure_details,
- &failed);
- MatchesProxyServerHelper("Bad proxy_for_https", proxy_for_https,
- rules.proxies_for_https, &failure_details,
- &failed);
- MatchesProxyServerHelper("Bad fallback_proxy", fallback_proxy,
- rules.fallback_proxies, &failure_details, &failed);
-
- std::string actual_flattened_bypass = FlattenProxyBypass(rules.bypass_rules);
- if (std::string(flattened_bypass_rules) != actual_flattened_bypass) {
- failure_details
- << "Bad bypass rules. Expected: \"" << flattened_bypass_rules
- << "\" but got: \"" << actual_flattened_bypass << "\"";
- failed = true;
- }
-
- if (rules.reverse_bypass != reverse_bypass) {
- failure_details << "Bad reverse_bypass. Expected: " << reverse_bypass
- << " but got: " << rules.reverse_bypass;
- failed = true;
- }
-
- return failed ? failure_details : ::testing::AssertionSuccess();
-}
-
-// static
-ProxyRulesExpectation ProxyRulesExpectation::Empty() {
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_NO_RULES,
- "", "", "", "", "", "", false);
-}
-
-// static
-ProxyRulesExpectation ProxyRulesExpectation::EmptyWithBypass(
- const char* flattened_bypass_rules) {
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_NO_RULES,
- "", "", "", "", "", flattened_bypass_rules,
- false);
-}
-
-// static
-ProxyRulesExpectation ProxyRulesExpectation::Single(
- const char* single_proxy,
- const char* flattened_bypass_rules) {
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_SINGLE_PROXY,
- single_proxy, "", "", "", "",
- flattened_bypass_rules, false);
-}
-
-// static
-ProxyRulesExpectation ProxyRulesExpectation::PerScheme(
- const char* proxy_http,
- const char* proxy_https,
- const char* proxy_ftp,
- const char* flattened_bypass_rules) {
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME,
- "", proxy_http, proxy_https, proxy_ftp, "",
- flattened_bypass_rules, false);
-}
-
-// static
-ProxyRulesExpectation ProxyRulesExpectation::PerSchemeWithSocks(
- const char* proxy_http,
- const char* proxy_https,
- const char* proxy_ftp,
- const char* socks_proxy,
- const char* flattened_bypass_rules) {
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME,
- "", proxy_http, proxy_https, proxy_ftp,
- socks_proxy, flattened_bypass_rules, false);
-}
-
-// static
-ProxyRulesExpectation ProxyRulesExpectation::PerSchemeWithBypassReversed(
- const char* proxy_http,
- const char* proxy_https,
- const char* proxy_ftp,
- const char* flattened_bypass_rules) {
- return ProxyRulesExpectation(ProxyConfig::ProxyRules::TYPE_PROXY_PER_SCHEME,
- "", proxy_http, proxy_https, proxy_ftp, "",
- flattened_bypass_rules, true);
-}
-
-} // namespace net
« no previous file with comments | « net/proxy/proxy_config_service_common_unittest.h ('k') | net/proxy/proxy_config_service_fixed.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698