diff options
author | cbentzel@chromium.org <cbentzel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-01 19:23:49 +0000 |
---|---|---|
committer | cbentzel@chromium.org <cbentzel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-09-01 19:23:49 +0000 |
commit | fbe02d647538479cc11a5503f9fdbc27cf3c5c60 (patch) | |
tree | 290b154b2d63bacea60d101750482f693ac33def | |
parent | 13b2ca75b9ad777517be5156815037ccf1af6149 (diff) | |
download | chromium_src-fbe02d647538479cc11a5503f9fdbc27cf3c5c60.zip chromium_src-fbe02d647538479cc11a5503f9fdbc27cf3c5c60.tar.gz chromium_src-fbe02d647538479cc11a5503f9fdbc27cf3c5c60.tar.bz2 |
Unit tests for CanDelegate on URLSecurityManager.
BUG=50076
TEST=net_unittests --gtest_filter="*URLSecurityManager.CanDelegate*"
Review URL: http://codereview.chromium.org/3311003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58217 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r-- | net/http/url_security_manager_unittest.cc | 33 |
1 files changed, 32 insertions, 1 deletions
diff --git a/net/http/url_security_manager_unittest.cc b/net/http/url_security_manager_unittest.cc index f83bb47..45d93c9 100644 --- a/net/http/url_security_manager_unittest.cc +++ b/net/http/url_security_manager_unittest.cc @@ -43,7 +43,7 @@ const TestData kTestDataList[] = { } // namespace -TEST(URLSecurityManager, CreateWhitelist) { +TEST(URLSecurityManager, UseDefaultCredentials) { HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist( kTestAuthWhitelist); ASSERT_TRUE(auth_filter); @@ -62,4 +62,35 @@ TEST(URLSecurityManager, CreateWhitelist) { } } +TEST(URLSecurityManager, CanDelegate) { + HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist( + kTestAuthWhitelist); + ASSERT_TRUE(auth_filter); + // The URL security manager takes ownership of |auth_filter|. + scoped_ptr<URLSecurityManager> url_security_manager( + URLSecurityManager::Create(NULL, auth_filter)); + ASSERT_TRUE(url_security_manager.get()); + + for (size_t i = 0; i < arraysize(kTestDataList); ++i) { + GURL gurl(kTestDataList[i].url); + bool can_delegate = url_security_manager->CanDelegate(gurl); + EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_delegate) + << " Run: " << i << " URL: '" << gurl << "'"; + } +} + +TEST(URLSecurityManager, CanDelegate_NoWhitelist) { + // Nothing can delegate in this case. + scoped_ptr<URLSecurityManager> url_security_manager( + URLSecurityManager::Create(NULL, NULL)); + ASSERT_TRUE(url_security_manager.get()); + + for (size_t i = 0; i < arraysize(kTestDataList); ++i) { + GURL gurl(kTestDataList[i].url); + bool can_delegate = url_security_manager->CanDelegate(gurl); + EXPECT_EQ(false, can_delegate); + } +} + + } // namespace net |