summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorcbentzel@chromium.org <cbentzel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-09-01 19:23:49 +0000
committercbentzel@chromium.org <cbentzel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-09-01 19:23:49 +0000
commitfbe02d647538479cc11a5503f9fdbc27cf3c5c60 (patch)
tree290b154b2d63bacea60d101750482f693ac33def
parent13b2ca75b9ad777517be5156815037ccf1af6149 (diff)
downloadchromium_src-fbe02d647538479cc11a5503f9fdbc27cf3c5c60.zip
chromium_src-fbe02d647538479cc11a5503f9fdbc27cf3c5c60.tar.gz
chromium_src-fbe02d647538479cc11a5503f9fdbc27cf3c5c60.tar.bz2
Unit tests for CanDelegate on URLSecurityManager.
BUG=50076 TEST=net_unittests --gtest_filter="*URLSecurityManager.CanDelegate*" Review URL: http://codereview.chromium.org/3311003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58217 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r--net/http/url_security_manager_unittest.cc33
1 files changed, 32 insertions, 1 deletions
diff --git a/net/http/url_security_manager_unittest.cc b/net/http/url_security_manager_unittest.cc
index f83bb47..45d93c9 100644
--- a/net/http/url_security_manager_unittest.cc
+++ b/net/http/url_security_manager_unittest.cc
@@ -43,7 +43,7 @@ const TestData kTestDataList[] = {
} // namespace
-TEST(URLSecurityManager, CreateWhitelist) {
+TEST(URLSecurityManager, UseDefaultCredentials) {
HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist(
kTestAuthWhitelist);
ASSERT_TRUE(auth_filter);
@@ -62,4 +62,35 @@ TEST(URLSecurityManager, CreateWhitelist) {
}
}
+TEST(URLSecurityManager, CanDelegate) {
+ HttpAuthFilterWhitelist* auth_filter = new HttpAuthFilterWhitelist(
+ kTestAuthWhitelist);
+ ASSERT_TRUE(auth_filter);
+ // The URL security manager takes ownership of |auth_filter|.
+ scoped_ptr<URLSecurityManager> url_security_manager(
+ URLSecurityManager::Create(NULL, auth_filter));
+ ASSERT_TRUE(url_security_manager.get());
+
+ for (size_t i = 0; i < arraysize(kTestDataList); ++i) {
+ GURL gurl(kTestDataList[i].url);
+ bool can_delegate = url_security_manager->CanDelegate(gurl);
+ EXPECT_EQ(kTestDataList[i].succeeds_in_whitelist, can_delegate)
+ << " Run: " << i << " URL: '" << gurl << "'";
+ }
+}
+
+TEST(URLSecurityManager, CanDelegate_NoWhitelist) {
+ // Nothing can delegate in this case.
+ scoped_ptr<URLSecurityManager> url_security_manager(
+ URLSecurityManager::Create(NULL, NULL));
+ ASSERT_TRUE(url_security_manager.get());
+
+ for (size_t i = 0; i < arraysize(kTestDataList); ++i) {
+ GURL gurl(kTestDataList[i].url);
+ bool can_delegate = url_security_manager->CanDelegate(gurl);
+ EXPECT_EQ(false, can_delegate);
+ }
+}
+
+
} // namespace net