diff options
author | eroman@chromium.org <eroman@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-06-08 23:25:04 +0000 |
---|---|---|
committer | eroman@chromium.org <eroman@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-06-08 23:25:04 +0000 |
commit | 5439283ff95a6f7d8b9e6d86c0fd178b0238acaa (patch) | |
tree | 6b067f14016e3c39adf8eb654ff18fc2ff1886de /net/proxy/proxy_bypass_rules_unittest.cc | |
parent | ec561333496a9b4f7f29718aef43094596f2d489 (diff) | |
download | chromium_src-5439283ff95a6f7d8b9e6d86c0fd178b0238acaa.zip chromium_src-5439283ff95a6f7d8b9e6d86c0fd178b0238acaa.tar.gz chromium_src-5439283ff95a6f7d8b9e6d86c0fd178b0238acaa.tar.bz2 |
Allow bypassing a block of IP addresses using CIDR notation in the proxy bypass list.
For example:
10.3.1.3/16
2020:ffff::/96
Note that similar to firefox, this is only applied to IP literals in URLs, and NOT to the resolved addresses of URLs.
BUG=9835
Review URL: http://codereview.chromium.org/2663001
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@49211 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/proxy/proxy_bypass_rules_unittest.cc')
-rw-r--r-- | net/proxy/proxy_bypass_rules_unittest.cc | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/net/proxy/proxy_bypass_rules_unittest.cc b/net/proxy/proxy_bypass_rules_unittest.cc index 1bf24cb..208f9cd 100644 --- a/net/proxy/proxy_bypass_rules_unittest.cc +++ b/net/proxy/proxy_bypass_rules_unittest.cc @@ -281,6 +281,34 @@ TEST(ProxyBypassRulesTest, BypassLocalNames) { } } +TEST(ProxyBypassRulesTest, ParseAndMatchCIDR_IPv4) { + ProxyBypassRules rules; + rules.ParseFromString("192.168.1.1/16"); + ASSERT_EQ(1u, rules.rules().size()); + EXPECT_EQ("192.168.1.1/16", rules.rules()[0]->ToString()); + + EXPECT_TRUE(rules.Matches(GURL("http://192.168.1.1"))); + EXPECT_TRUE(rules.Matches(GURL("ftp://192.168.4.4"))); + EXPECT_TRUE(rules.Matches(GURL("https://192.168.0.0:81"))); + EXPECT_TRUE(rules.Matches(GURL("http://[::ffff:192.168.11.11]"))); + + EXPECT_FALSE(rules.Matches(GURL("http://foobar.com"))); + EXPECT_FALSE(rules.Matches(GURL("http://192.169.1.1"))); + EXPECT_FALSE(rules.Matches(GURL("http://xxx.192.168.1.1"))); + EXPECT_FALSE(rules.Matches(GURL("http://192.168.1.1.xx"))); +} + +TEST(ProxyBypassRulesTest, ParseAndMatchCIDR_IPv6) { + ProxyBypassRules rules; + rules.ParseFromString("a:b:c:d::/48"); + ASSERT_EQ(1u, rules.rules().size()); + EXPECT_EQ("a:b:c:d::/48", rules.rules()[0]->ToString()); + + EXPECT_TRUE(rules.Matches(GURL("http://[A:b:C:9::]"))); + EXPECT_FALSE(rules.Matches(GURL("http://foobar.com"))); + EXPECT_FALSE(rules.Matches(GURL("http://192.169.1.1"))); +} + } // namespace } // namespace net |