| Index: net/http/url_security_manager_unittest.cc
|
| diff --git a/net/http/url_security_manager_unittest.cc b/net/http/url_security_manager_unittest.cc
|
| deleted file mode 100644
|
| index 8e6d8c5cb9c7b5b684a04ec407d9fafd1b92543b..0000000000000000000000000000000000000000
|
| --- a/net/http/url_security_manager_unittest.cc
|
| +++ /dev/null
|
| @@ -1,96 +0,0 @@
|
| -// Copyright (c) 2010 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/http/url_security_manager.h"
|
| -
|
| -#include "base/basictypes.h"
|
| -#include "net/base/net_errors.h"
|
| -#include "net/http/http_auth_filter.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -#include "url/gurl.h"
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -struct TestData {
|
| - const char* const url;
|
| - bool succeds_in_windows_default;
|
| - bool succeeds_in_whitelist;
|
| -};
|
| -
|
| -const char kTestAuthWhitelist[] = "*example.com,*foobar.com,baz";
|
| -
|
| -// Under Windows the following will be allowed by default:
|
| -// localhost
|
| -// host names without a period.
|
| -// In Posix systems (or on Windows if a whitelist is specified explicitly),
|
| -// everything depends on the whitelist.
|
| -const TestData kTestDataList[] = {
|
| - { "http://localhost", true, false },
|
| - { "http://bat", true, false },
|
| - { "http://www.example.com", false, true },
|
| - { "http://example.com", false, true },
|
| - { "http://foobar.com", false, true },
|
| - { "http://boo.foobar.com", false, true },
|
| - { "http://baz", true, true },
|
| - { "http://www.exampl.com", false, false },
|
| - { "http://example.org", false, false },
|
| - { "http://foobar.net", false, false },
|
| - { "http://boo.fubar.com", false, false },
|
| -};
|
| -
|
| -} // namespace
|
| -
|
| -TEST(URLSecurityManager, UseDefaultCredentials) {
|
| - HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist(
|
| - kTestAuthWhitelist);
|
| - ASSERT_TRUE(auth_filter);
|
| - // The URL security manager takes ownership of |auth_filter|.
|
| - scoped_ptr<URLSecurityManager> url_security_manager(
|
| - URLSecurityManager::Create(auth_filter, NULL));
|
| - ASSERT_TRUE(url_security_manager.get());
|
| -
|
| - for (size_t i = 0; i < arraysize(kTestDataList); ++i) {
|
| - GURL gurl(kTestDataList[i].url);
|
| - bool can_use_default =
|
| - url_security_manager->CanUseDefaultCredentials(gurl);
|
| -
|
| - EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_use_default)
|
| - << " Run: " << i << " URL: '" << gurl << "'";
|
| - }
|
| -}
|
| -
|
| -TEST(URLSecurityManager, CanDelegate) {
|
| - HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist(
|
| - kTestAuthWhitelist);
|
| - ASSERT_TRUE(auth_filter);
|
| - // The URL security manager takes ownership of |auth_filter|.
|
| - scoped_ptr<URLSecurityManager> url_security_manager(
|
| - URLSecurityManager::Create(NULL, auth_filter));
|
| - ASSERT_TRUE(url_security_manager.get());
|
| -
|
| - for (size_t i = 0; i < arraysize(kTestDataList); ++i) {
|
| - GURL gurl(kTestDataList[i].url);
|
| - bool can_delegate = url_security_manager->CanDelegate(gurl);
|
| - EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_delegate)
|
| - << " Run: " << i << " URL: '" << gurl << "'";
|
| - }
|
| -}
|
| -
|
| -TEST(URLSecurityManager, CanDelegate_NoWhitelist) {
|
| - // Nothing can delegate in this case.
|
| - scoped_ptr<URLSecurityManager> url_security_manager(
|
| - URLSecurityManager::Create(NULL, NULL));
|
| - ASSERT_TRUE(url_security_manager.get());
|
| -
|
| - for (size_t i = 0; i < arraysize(kTestDataList); ++i) {
|
| - GURL gurl(kTestDataList[i].url);
|
| - bool can_delegate = url_security_manager->CanDelegate(gurl);
|
| - EXPECT_FALSE(can_delegate);
|
| - }
|
| -}
|
| -
|
| -
|
| -} // namespace net
|
|
|