Skip to content
This repository has been archived by the owner on Apr 21, 2023. It is now read-only.

Commit

Permalink
External resource moved from www.google.com to cse.google.com, and we…
Browse files Browse the repository at this point in the history
… can't follow redirects in fetching. This is breaking our tests.
  • Loading branch information
crowell committed Dec 7, 2015
1 parent 93caf5b commit e4454b3
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion install/mod_pagespeed_test/unauthorized/inline_css.html
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
<html>
<head>
<title>inline_css example</title>
<link rel="stylesheet" href="http://www.google.com/cse/style/look/default.css">
<link rel="stylesheet" href="http://cse.google.com/cse/style/look/default.css">
<link rel="stylesheet" href="../../mod_pagespeed_example/styles/all_styles.css">
</head>
<body>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
<html>
<head>
<title>prioritize_critical_css example</title>
<link rel="stylesheet" type="text/css" href="http://www.google.com/cse/style/look/default.css">
<link rel="stylesheet" type="text/css" href="http://cse.google.com/cse/style/look/default.css">
<link rel="stylesheet" type="text/css" href="with_unauthorized_imports.css">
</head>
<body>
Expand Down
4 changes: 2 additions & 2 deletions net/instaweb/apache/system_test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -693,7 +693,7 @@ OUTFILE=$OUTDIR/blocking_rewrite.out.html
$WGET_DUMP --header 'X-PSA-Blocking-Rewrite: psatest' $URL > $OUTFILE
check egrep -q 'link[[:space:]]rel=' $OUTFILE
EXPECTED_COMMENT_LINE="<!--The preceding resource was not rewritten \
because its domain (www.google.com) is not authorized-->"
because its domain (cse.google.com) is not authorized-->"
check [ $(grep -o "$EXPECTED_COMMENT_LINE" $OUTFILE | wc -l) -eq 1 ]

if [ "$SECONDARY_HOSTNAME" != "" ]; then
Expand Down Expand Up @@ -2101,7 +2101,7 @@ if [ "$SECONDARY_HOSTNAME" != "" ]; then
http://www.google.com/css/maia.css as it is on an unauthorized domain-->"
check [ $(grep -o "$EXPECTED_IMPORT_FAILURE_LINE" $FETCH_FILE | wc -l) -eq 1 ]
EXPECTED_COMMENT_LINE="<!--The preceding resource was not rewritten \
because its domain (www.google.com) is not authorized-->"
because its domain (cse.google.com) is not authorized-->"
check [ $(grep -o "$EXPECTED_COMMENT_LINE" $FETCH_FILE | wc -l) -eq 1 ]

start_test inline_unauthorized_resources allows unauthorized css selectors
Expand Down

0 comments on commit e4454b3

Please sign in to comment.