| OLD | NEW |
| 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <Windows.h> | 5 #include <Windows.h> |
| 6 #include <Wincrypt.h> | 6 #include <Wincrypt.h> |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "chrome/common/pref_names.h" | 10 #include "chrome/common/pref_names.h" |
| 11 #include "chrome/test/automation/browser_proxy.h" | 11 #include "chrome/test/automation/browser_proxy.h" |
| 12 #include "chrome/test/automation/tab_proxy.h" | 12 #include "chrome/test/automation/tab_proxy.h" |
| 13 #include "chrome/test/ui/ui_test.h" | 13 #include "chrome/test/ui/ui_test.h" |
| 14 #include "net/base/ssl_test_util.h" |
| 14 #include "net/url_request/url_request_unittest.h" | 15 #include "net/url_request/url_request_unittest.h" |
| 15 | 16 |
| 16 namespace { | 17 namespace { |
| 17 | 18 |
| 18 const wchar_t kDocRoot[] = L"chrome/test/data"; | 19 const wchar_t kDocRoot[] = L"chrome/test/data"; |
| 19 const char kHostName[] = "127.0.0.1"; | |
| 20 | |
| 21 const int kOKHTTPSPort = 9443; | |
| 22 const int kBadHTTPSPort = 9666; | |
| 23 | |
| 24 // The issuer name of the cert that should be trusted for the test to work. | |
| 25 const wchar_t kCertIssuerName[] = L"Test CA"; | |
| 26 | 20 |
| 27 class SSLUITest : public UITest { | 21 class SSLUITest : public UITest { |
| 28 protected: | 22 protected: |
| 29 SSLUITest() { | 23 SSLUITest() { |
| 30 CheckCATrusted(); | |
| 31 dom_automation_enabled_ = true; | 24 dom_automation_enabled_ = true; |
| 32 PathService::Get(base::DIR_SOURCE_ROOT, &cert_dir_); | 25 EXPECT_TRUE(util_.CheckCATrusted()); |
| 33 cert_dir_ += L"/chrome/test/data/ssl/certificates/"; | |
| 34 std::replace(cert_dir_.begin(), cert_dir_.end(), | |
| 35 L'/', FilePath::kSeparators[0]); | |
| 36 } | 26 } |
| 37 | 27 |
| 38 TabProxy* GetActiveTabProxy() { | 28 TabProxy* GetActiveTabProxy() { |
| 39 scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 29 scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 40 EXPECT_TRUE(browser_proxy.get()); | 30 EXPECT_TRUE(browser_proxy.get()); |
| 41 return browser_proxy->GetActiveTab(); | 31 return browser_proxy->GetActiveTab(); |
| 42 } | 32 } |
| 43 | 33 |
| 44 void NavigateTab(TabProxy* tab_proxy, const GURL& url) { | 34 void NavigateTab(TabProxy* tab_proxy, const GURL& url) { |
| 45 ASSERT_TRUE(tab_proxy->NavigateToURL(url)); | 35 ASSERT_TRUE(tab_proxy->NavigateToURL(url)); |
| 46 } | 36 } |
| 47 | 37 |
| 48 void AppendTab(const GURL& url) { | 38 void AppendTab(const GURL& url) { |
| 49 scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 39 scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 50 EXPECT_TRUE(browser_proxy.get()); | 40 EXPECT_TRUE(browser_proxy.get()); |
| 51 EXPECT_TRUE(browser_proxy->AppendTab(url)); | 41 EXPECT_TRUE(browser_proxy->AppendTab(url)); |
| 52 } | 42 } |
| 53 | 43 |
| 54 std::wstring GetOKCertPath() { | 44 TestServer* PlainServer() { |
| 55 std::wstring path(cert_dir_); | 45 return new TestServer(kDocRoot); |
| 56 file_util::AppendToPath(&path, L"ok_cert.pem"); | |
| 57 return path; | |
| 58 } | 46 } |
| 59 | 47 |
| 60 std::wstring GetInvalidCertPath() { | 48 HTTPSTestServer* GoodCertServer() { |
| 61 std::wstring path(cert_dir_); | 49 return new HTTPSTestServer(util_.kHostName, util_.kOKHTTPSPort, |
| 62 file_util::AppendToPath(&path, L"invalid_cert.pem"); | 50 kDocRoot, util_.GetOKCertPath().ToWStringHack()); |
| 63 return path; | |
| 64 } | 51 } |
| 65 | 52 |
| 66 std::wstring GetExpiredCertPath() { | 53 HTTPSTestServer* BadCertServer() { |
| 67 std::wstring path(cert_dir_); | 54 return new HTTPSTestServer(util_.kHostName, util_.kBadHTTPSPort, |
| 68 file_util::AppendToPath(&path, L"expired_cert.pem"); | 55 kDocRoot, util_.GetExpiredCertPath().ToWStringHack()); |
| 69 return path; | |
| 70 } | 56 } |
| 71 | 57 |
| 72 HTTPSTestServer GoodServer() { | 58 protected: |
| 73 return HTTPSTestServer(kHostName, kOKHTTPSPort, kDocRoot, GetOKCertPath()); | 59 SSLTestUtil util_; |
| 74 } | |
| 75 | 60 |
| 76 HTTPSTestServer BadServer() { | 61 DISALLOW_COPY_AND_ASSIGN(SSLUITest); |
| 77 return HTTPSTestServer(kHostName, kBadHTTPSPort, kDocRoot, | |
| 78 GetExpiredCertPath()); | |
| 79 } | |
| 80 | |
| 81 private: | |
| 82 void CheckCATrusted() { | |
| 83 HCERTSTORE cert_store = CertOpenSystemStore(NULL, L"ROOT"); | |
| 84 if (!cert_store) { | |
| 85 FAIL() << " could not open trusted root CA store"; | |
| 86 return; | |
| 87 } | |
| 88 PCCERT_CONTEXT cert = | |
| 89 CertFindCertificateInStore(cert_store, | |
| 90 X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, | |
| 91 0, | |
| 92 CERT_FIND_ISSUER_STR, | |
| 93 kCertIssuerName, | |
| 94 NULL); | |
| 95 if (cert) | |
| 96 CertFreeCertificateContext(cert); | |
| 97 CertCloseStore(cert_store, 0); | |
| 98 | |
| 99 if (!cert) { | |
| 100 FAIL() << " TEST CONFIGURATION ERROR: you need to import the test ca " | |
| 101 "certificate to your trusted roots for this test to work. For more " | |
| 102 "info visit:\n" | |
| 103 "http://wiki.corp.google.com/twiki/bin/view/Main/ChromeUnitUITests\n"; | |
| 104 } | |
| 105 } | |
| 106 | |
| 107 std::wstring cert_dir_; | |
| 108 }; | 62 }; |
| 109 | 63 |
| 110 } // namespace | 64 } // namespace |
| 111 | 65 |
| 112 // Visits a regular page over http. | 66 // Visits a regular page over http. |
| 113 TEST_F(SSLUITest, TestHTTP) { | 67 TEST_F(SSLUITest, TestHTTP) { |
| 114 TestServer server(kDocRoot); | 68 scoped_ptr<TestServer> server(PlainServer()); |
| 115 | 69 |
| 116 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 70 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 117 NavigateTab(tab.get(), server.TestServerPageW(L"files/ssl/google.html")); | 71 NavigateTab(tab.get(), server->TestServerPageW(L"files/ssl/google.html")); |
| 118 | 72 |
| 119 NavigationEntry::PageType page_type; | 73 NavigationEntry::PageType page_type; |
| 120 EXPECT_TRUE(tab->GetPageType(&page_type)); | 74 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 121 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 75 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 122 | 76 |
| 123 SecurityStyle security_style; | 77 SecurityStyle security_style; |
| 124 int cert_status; | 78 int cert_status; |
| 125 int mixed_content_state; | 79 int mixed_content_state; |
| 126 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 80 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 127 &mixed_content_state)); | 81 &mixed_content_state)); |
| 128 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); | 82 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); |
| 129 EXPECT_EQ(0, cert_status); | 83 EXPECT_EQ(0, cert_status); |
| 130 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 84 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 131 } | 85 } |
| 132 | 86 |
| 133 // Visits a page over http which includes broken https resources (status should | 87 // Visits a page over http which includes broken https resources (status should |
| 134 // be OK). | 88 // be OK). |
| 135 TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) { | 89 TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) { |
| 136 TestServer http_server(kDocRoot); | 90 scoped_ptr<TestServer> http_server(PlainServer()); |
| 137 HTTPSTestServer httpsServer(kHostName, kBadHTTPSPort, | 91 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 138 kDocRoot, GetExpiredCertPath()); | |
| 139 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 92 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 140 | 93 |
| 141 NavigateTab(tab.get(), | 94 NavigateTab(tab.get(), |
| 142 http_server.TestServerPageW(L"files/ssl/page_with_unsafe_contents.html")); | 95 http_server->TestServerPageW(L"files/ssl/page_with_unsafe_contents.html"))
; |
| 143 | 96 |
| 144 SecurityStyle security_style; | 97 SecurityStyle security_style; |
| 145 int cert_status; | 98 int cert_status; |
| 146 int mixed_content_state; | 99 int mixed_content_state; |
| 147 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 100 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 148 &mixed_content_state)); | 101 &mixed_content_state)); |
| 149 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); | 102 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); |
| 150 EXPECT_EQ(0, cert_status); | 103 EXPECT_EQ(0, cert_status); |
| 151 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 104 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 152 } | 105 } |
| 153 | 106 |
| 154 // Visits a page over OK https: | 107 // Visits a page over OK https: |
| 155 TEST_F(SSLUITest, TestOKHTTPS) { | 108 TEST_F(SSLUITest, TestOKHTTPS) { |
| 156 HTTPSTestServer https_server = GoodServer(); | 109 scoped_ptr<HTTPSTestServer> https_server(GoodCertServer()); |
| 157 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 110 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 158 NavigateTab(tab.get(), | 111 NavigateTab(tab.get(), |
| 159 https_server.TestServerPageW(L"files/ssl/google.html")); | 112 https_server->TestServerPageW(L"files/ssl/google.html")); |
| 160 | 113 |
| 161 NavigationEntry::PageType page_type; | 114 NavigationEntry::PageType page_type; |
| 162 EXPECT_TRUE(tab->GetPageType(&page_type)); | 115 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 163 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 116 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 164 | 117 |
| 165 SecurityStyle security_style; | 118 SecurityStyle security_style; |
| 166 int cert_status; | 119 int cert_status; |
| 167 int mixed_content_state; | 120 int mixed_content_state; |
| 168 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 121 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 169 &mixed_content_state)); | 122 &mixed_content_state)); |
| 170 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 123 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 171 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); | 124 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 172 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 125 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 173 } | 126 } |
| 174 | 127 |
| 175 // Visits a page with https error: | 128 // Visits a page with https error: |
| 176 TEST_F(SSLUITest, TestHTTPSExpiredCert) { | 129 TEST_F(SSLUITest, TestHTTPSExpiredCert) { |
| 177 HTTPSTestServer https_server = BadServer(); | 130 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 178 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 131 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 179 NavigateTab(tab.get(), | 132 NavigateTab(tab.get(), |
| 180 https_server.TestServerPageW(L"files/ssl/google.html")); | 133 bad_https_server->TestServerPageW(L"files/ssl/google.html")); |
| 181 | 134 |
| 182 NavigationEntry::PageType page_type; | 135 NavigationEntry::PageType page_type; |
| 183 EXPECT_TRUE(tab->GetPageType(&page_type)); | 136 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 184 EXPECT_EQ(NavigationEntry::INTERSTITIAL_PAGE, page_type); | 137 EXPECT_EQ(NavigationEntry::INTERSTITIAL_PAGE, page_type); |
| 185 | 138 |
| 186 SecurityStyle security_style; | 139 SecurityStyle security_style; |
| 187 int cert_status; | 140 int cert_status; |
| 188 int mixed_content_state; | 141 int mixed_content_state; |
| 189 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 142 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 190 &mixed_content_state)); | 143 &mixed_content_state)); |
| (...skipping 12 matching lines...) Expand all Loading... |
| 203 cert_status & net::CERT_STATUS_ALL_ERRORS); | 156 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 204 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 157 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 205 } | 158 } |
| 206 | 159 |
| 207 // | 160 // |
| 208 // Mixed contents | 161 // Mixed contents |
| 209 // | 162 // |
| 210 | 163 |
| 211 // Visits a page with mixed content. | 164 // Visits a page with mixed content. |
| 212 TEST_F(SSLUITest, TestMixedContents) { | 165 TEST_F(SSLUITest, TestMixedContents) { |
| 213 HTTPSTestServer https_server = GoodServer(); | 166 scoped_ptr<HTTPSTestServer> https_server(GoodCertServer()); |
| 214 TestServer http_server(kDocRoot); | 167 scoped_ptr<TestServer> http_server(PlainServer()); |
| 215 | 168 |
| 216 // Load a page with mixed-content, the default behavior is to show the mixed | 169 // Load a page with mixed-content, the default behavior is to show the mixed |
| 217 // content. | 170 // content. |
| 218 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 171 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 219 NavigateTab(tab.get(), | 172 NavigateTab(tab.get(), |
| 220 https_server.TestServerPageW(L"files/ssl/page_with_mixed_contents.html")); | 173 https_server->TestServerPageW(L"files/ssl/page_with_mixed_contents.html"))
; |
| 221 NavigationEntry::PageType page_type; | 174 NavigationEntry::PageType page_type; |
| 222 EXPECT_TRUE(tab->GetPageType(&page_type)); | 175 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 223 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 176 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 224 | 177 |
| 225 SecurityStyle security_style; | 178 SecurityStyle security_style; |
| 226 int cert_status; | 179 int cert_status; |
| 227 int mixed_content_state; | 180 int mixed_content_state; |
| 228 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 181 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 229 &mixed_content_state)); | 182 &mixed_content_state)); |
| 230 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 183 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| (...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 275 &mixed_content_state)); | 228 &mixed_content_state)); |
| 276 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 229 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 277 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); | 230 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 278 EXPECT_EQ(NavigationEntry::SSLStatus::MIXED_CONTENT, mixed_content_state); | 231 EXPECT_EQ(NavigationEntry::SSLStatus::MIXED_CONTENT, mixed_content_state); |
| 279 } | 232 } |
| 280 | 233 |
| 281 // Visits a page with unsafe content and make sure that: | 234 // Visits a page with unsafe content and make sure that: |
| 282 // - frames content is replaced with warning | 235 // - frames content is replaced with warning |
| 283 // - images and scripts are filtered out entirely | 236 // - images and scripts are filtered out entirely |
| 284 TEST_F(SSLUITest, TestUnsafeContents) { | 237 TEST_F(SSLUITest, TestUnsafeContents) { |
| 285 HTTPSTestServer good_https_server = GoodServer(); | 238 scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer()); |
| 286 HTTPSTestServer bad_https_server = BadServer(); | 239 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 287 | 240 |
| 288 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 241 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 289 NavigateTab(tab.get(), | 242 NavigateTab(tab.get(), |
| 290 good_https_server.TestServerPageW( | 243 good_https_server->TestServerPageW( |
| 291 L"files/ssl/page_with_unsafe_contents.html")); | 244 L"files/ssl/page_with_unsafe_contents.html")); |
| 292 NavigationEntry::PageType page_type; | 245 NavigationEntry::PageType page_type; |
| 293 EXPECT_TRUE(tab->GetPageType(&page_type)); | 246 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 294 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 247 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 295 | 248 |
| 296 SecurityStyle security_style; | 249 SecurityStyle security_style; |
| 297 int cert_status; | 250 int cert_status; |
| 298 int mixed_content_state; | 251 int mixed_content_state; |
| 299 // When the bad content is filtered, the state is expected to be | 252 // When the bad content is filtered, the state is expected to be |
| 300 // authenticated. | 253 // authenticated. |
| (...skipping 24 matching lines...) Expand all Loading... |
| 325 | 278 |
| 326 bool js_result = false; | 279 bool js_result = false; |
| 327 EXPECT_TRUE(tab->ExecuteAndExtractBool(L"", | 280 EXPECT_TRUE(tab->ExecuteAndExtractBool(L"", |
| 328 L"window.domAutomationController.send(IsFooSet());", | 281 L"window.domAutomationController.send(IsFooSet());", |
| 329 &js_result)); | 282 &js_result)); |
| 330 EXPECT_FALSE(js_result); | 283 EXPECT_FALSE(js_result); |
| 331 } | 284 } |
| 332 | 285 |
| 333 // Visits a page with mixed content loaded by JS (after the initial page load). | 286 // Visits a page with mixed content loaded by JS (after the initial page load). |
| 334 TEST_F(SSLUITest, TestMixedContentsLoadedFromJS) { | 287 TEST_F(SSLUITest, TestMixedContentsLoadedFromJS) { |
| 335 HTTPSTestServer https_server = GoodServer(); | 288 scoped_ptr<HTTPSTestServer> https_server(GoodCertServer()); |
| 336 TestServer http_server(kDocRoot); | 289 scoped_ptr<TestServer> http_server(PlainServer()); |
| 337 | 290 |
| 338 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 291 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 339 NavigateTab(tab.get(), https_server.TestServerPageW( | 292 NavigateTab(tab.get(), https_server->TestServerPageW( |
| 340 L"files/ssl/page_with_dynamic_mixed_contents.html")); | 293 L"files/ssl/page_with_dynamic_mixed_contents.html")); |
| 341 NavigationEntry::PageType page_type; | 294 NavigationEntry::PageType page_type; |
| 342 EXPECT_TRUE(tab->GetPageType(&page_type)); | 295 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 343 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 296 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 344 SecurityStyle security_style; | 297 SecurityStyle security_style; |
| 345 int cert_status; | 298 int cert_status; |
| 346 int mixed_content_state; | 299 int mixed_content_state; |
| 347 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 300 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 348 &mixed_content_state)); | 301 &mixed_content_state)); |
| 349 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 302 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| (...skipping 14 matching lines...) Expand all Loading... |
| 364 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 317 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 365 EXPECT_EQ(0, | 318 EXPECT_EQ(0, |
| 366 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. | 319 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. |
| 367 EXPECT_EQ(NavigationEntry::SSLStatus::MIXED_CONTENT, mixed_content_state); | 320 EXPECT_EQ(NavigationEntry::SSLStatus::MIXED_CONTENT, mixed_content_state); |
| 368 } | 321 } |
| 369 | 322 |
| 370 // Visits a page with an image over http. Visits another page over https | 323 // Visits a page with an image over http. Visits another page over https |
| 371 // referencing that same image over http (hoping it is coming from the webcore | 324 // referencing that same image over http (hoping it is coming from the webcore |
| 372 // memory cache). | 325 // memory cache). |
| 373 TEST_F(SSLUITest, TestCachedMixedContents) { | 326 TEST_F(SSLUITest, TestCachedMixedContents) { |
| 374 HTTPSTestServer https_server = GoodServer(); | 327 scoped_ptr<HTTPSTestServer> https_server(GoodCertServer()); |
| 375 TestServer http_server(kDocRoot); | 328 scoped_ptr<TestServer> http_server(PlainServer()); |
| 376 | 329 |
| 377 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 330 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 378 NavigateTab(tab.get(), http_server.TestServerPageW( | 331 NavigateTab(tab.get(), http_server->TestServerPageW( |
| 379 L"files/ssl/page_with_mixed_contents.html")); | 332 L"files/ssl/page_with_mixed_contents.html")); |
| 380 | 333 |
| 381 NavigationEntry::PageType page_type; | 334 NavigationEntry::PageType page_type; |
| 382 EXPECT_TRUE(tab->GetPageType(&page_type)); | 335 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 383 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 336 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 384 SecurityStyle security_style; | 337 SecurityStyle security_style; |
| 385 int cert_status; | 338 int cert_status; |
| 386 int mixed_content_state; | 339 int mixed_content_state; |
| 387 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 340 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 388 &mixed_content_state)); | 341 &mixed_content_state)); |
| 389 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); | 342 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); |
| 390 EXPECT_EQ(0, | 343 EXPECT_EQ(0, |
| 391 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. | 344 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. |
| 392 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 345 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 393 | 346 |
| 394 // Load again but over SSL. It should have mixed-contents (even though the | 347 // Load again but over SSL. It should have mixed-contents (even though the |
| 395 // image comes from the WebCore memory cache). | 348 // image comes from the WebCore memory cache). |
| 396 NavigateTab(tab.get(), https_server.TestServerPageW( | 349 NavigateTab(tab.get(), https_server->TestServerPageW( |
| 397 L"files/ssl/page_with_mixed_contents.html")); | 350 L"files/ssl/page_with_mixed_contents.html")); |
| 398 | 351 |
| 399 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 352 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 400 &mixed_content_state)); | 353 &mixed_content_state)); |
| 401 EXPECT_TRUE(tab->GetPageType(&page_type)); | 354 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 402 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 355 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 403 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 356 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 404 EXPECT_EQ(0, | 357 EXPECT_EQ(0, |
| 405 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. | 358 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. |
| 406 EXPECT_EQ(NavigationEntry::SSLStatus::MIXED_CONTENT, mixed_content_state); | 359 EXPECT_EQ(NavigationEntry::SSLStatus::MIXED_CONTENT, mixed_content_state); |
| 407 } | 360 } |
| 408 | 361 |
| 409 // This test ensures the CN invalid status does not 'stick' to a certificate | 362 // This test ensures the CN invalid status does not 'stick' to a certificate |
| 410 // (see bug #1044942) and that it depends on the host-name. | 363 // (see bug #1044942) and that it depends on the host-name. |
| 411 // TODO (jcampan): this test is flacky and fails sometimes (bug #1065095) | 364 // TODO(jcampan): this test is flacky and fails sometimes (bug #1065095) |
| 412 TEST_F(SSLUITest, DISABLED_TestCNInvalidStickiness) { | 365 TEST_F(SSLUITest, DISABLED_TestCNInvalidStickiness) { |
| 413 const std::string kLocalHost = "localhost"; | 366 const std::string kLocalHost = "localhost"; |
| 414 HTTPSTestServer https_server(kLocalHost, kOKHTTPSPort, | 367 scoped_ptr<HTTPSTestServer> https_server( |
| 415 kDocRoot, GetOKCertPath()); | 368 new HTTPSTestServer(kLocalHost, util_.kOKHTTPSPort, |
| 369 kDocRoot, util_.GetOKCertPath().ToWStringHack())); |
| 416 | 370 |
| 417 // First we hit the server with hostname, this generates an invalid policy | 371 // First we hit the server with hostname, this generates an invalid policy |
| 418 // error. | 372 // error. |
| 419 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 373 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 420 NavigateTab(tab.get(), https_server.TestServerPageW( | 374 NavigateTab(tab.get(), https_server->TestServerPageW( |
| 421 L"files/ssl/google.html")); | 375 L"files/ssl/google.html")); |
| 422 | 376 |
| 423 // We get an interstitial page as a result. | 377 // We get an interstitial page as a result. |
| 424 NavigationEntry::PageType page_type; | 378 NavigationEntry::PageType page_type; |
| 425 EXPECT_TRUE(tab->GetPageType(&page_type)); | 379 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 426 EXPECT_EQ(NavigationEntry::INTERSTITIAL_PAGE, page_type); | 380 EXPECT_EQ(NavigationEntry::INTERSTITIAL_PAGE, page_type); |
| 427 | 381 |
| 428 SecurityStyle security_style; | 382 SecurityStyle security_style; |
| 429 int cert_status; | 383 int cert_status; |
| 430 int mixed_content_state; | 384 int mixed_content_state; |
| 431 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 385 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 432 &mixed_content_state)); | 386 &mixed_content_state)); |
| 433 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 387 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 434 EXPECT_EQ(net::CERT_STATUS_COMMON_NAME_INVALID, | 388 EXPECT_EQ(net::CERT_STATUS_COMMON_NAME_INVALID, |
| 435 cert_status & net::CERT_STATUS_ALL_ERRORS); | 389 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 436 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 390 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 437 | 391 |
| 438 // We proceed through the interstitial page. | 392 // We proceed through the interstitial page. |
| 439 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); | 393 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); |
| 440 EXPECT_TRUE(tab->GetPageType(&page_type)); | 394 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 441 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 395 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 442 | 396 |
| 443 // Now we try again with the right host name this time. | 397 // Now we try again with the right host name this time. |
| 444 | 398 |
| 445 // Let's change the host-name in the url. | 399 // Let's change the host-name in the url. |
| 446 GURL url = https_server.TestServerPageW(L"files/ssl/google.html"); | 400 GURL url = https_server->TestServerPageW(L"files/ssl/google.html"); |
| 447 std::string::size_type hostname_index = url.spec().find(kLocalHost); | 401 std::string::size_type hostname_index = url.spec().find(kLocalHost); |
| 448 ASSERT_TRUE(hostname_index != std::string::npos); // Test sanity check. | 402 ASSERT_TRUE(hostname_index != std::string::npos); // Test sanity check. |
| 449 std::string new_url; | 403 std::string new_url; |
| 450 new_url.append(url.spec().substr(0, hostname_index)); | 404 new_url.append(url.spec().substr(0, hostname_index)); |
| 451 new_url.append(kHostName); | 405 new_url.append(util_.kHostName); |
| 452 new_url.append(url.spec().substr(hostname_index + kLocalHost.size())); | 406 new_url.append(url.spec().substr(hostname_index + kLocalHost.size())); |
| 453 | 407 |
| 454 NavigateTab(tab.get(), GURL(new_url)); | 408 NavigateTab(tab.get(), GURL(new_url)); |
| 455 | 409 |
| 456 // Security state should be OK. | 410 // Security state should be OK. |
| 457 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 411 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 458 &mixed_content_state)); | 412 &mixed_content_state)); |
| 459 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 413 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 460 EXPECT_EQ(0, | 414 EXPECT_EQ(0, |
| 461 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. | 415 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. |
| 462 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 416 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 463 | 417 |
| 464 // Now try again the broken one to make sure it is still broken. | 418 // Now try again the broken one to make sure it is still broken. |
| 465 NavigateTab(tab.get(), https_server.TestServerPageW( | 419 NavigateTab(tab.get(), https_server->TestServerPageW( |
| 466 L"files/ssl/google.html")); | 420 L"files/ssl/google.html")); |
| 467 | 421 |
| 468 EXPECT_TRUE(tab->GetPageType(&page_type)); | 422 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 469 // Since we OKed the interstitial last time, we get right to the page. | 423 // Since we OKed the interstitial last time, we get right to the page. |
| 470 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 424 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 471 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 425 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 472 &mixed_content_state)); | 426 &mixed_content_state)); |
| 473 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 427 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 474 EXPECT_EQ(net::CERT_STATUS_COMMON_NAME_INVALID, | 428 EXPECT_EQ(net::CERT_STATUS_COMMON_NAME_INVALID, |
| 475 cert_status & net::CERT_STATUS_ALL_ERRORS); | 429 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 476 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 430 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 477 } | 431 } |
| 478 | 432 |
| 479 // Test that navigating to a #ref does not change a bad security state. | 433 // Test that navigating to a #ref does not change a bad security state. |
| 480 TEST_F(SSLUITest, TestRefNavigation) { | 434 TEST_F(SSLUITest, TestRefNavigation) { |
| 481 HTTPSTestServer https_server = BadServer(); | 435 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 482 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 436 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 483 NavigateTab(tab.get(), | 437 NavigateTab(tab.get(), |
| 484 https_server.TestServerPageW(L"files/ssl/page_with_refs.html")); | 438 bad_https_server->TestServerPageW(L"files/ssl/page_with_refs.html"
)); |
| 485 | 439 |
| 486 NavigationEntry::PageType page_type; | 440 NavigationEntry::PageType page_type; |
| 487 EXPECT_TRUE(tab->GetPageType(&page_type)); | 441 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 488 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); | 442 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); |
| 489 | 443 |
| 490 SecurityStyle security_style; | 444 SecurityStyle security_style; |
| 491 int cert_status; | 445 int cert_status; |
| 492 int mixed_content_state; | 446 int mixed_content_state; |
| 493 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 447 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 494 &mixed_content_state)); | 448 &mixed_content_state)); |
| 495 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 449 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 496 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, cert_status); | 450 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, cert_status); |
| 497 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 451 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 498 | 452 |
| 499 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); | 453 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); |
| 500 EXPECT_TRUE(tab->GetPageType(&page_type)); | 454 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 501 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); | 455 EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
| 502 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 456 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 503 &mixed_content_state)); | 457 &mixed_content_state)); |
| 504 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 458 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 505 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, | 459 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, |
| 506 cert_status & net::CERT_STATUS_ALL_ERRORS); | 460 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 507 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 461 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 508 | 462 |
| 509 // Now navigate to a ref in the page. | 463 // Now navigate to a ref in the page. |
| 510 NavigateTab(tab.get(), | 464 NavigateTab(tab.get(), |
| 511 https_server.TestServerPageW(L"files/ssl/page_with_refs.html#jp")); | 465 bad_https_server->TestServerPageW(L"files/ssl/page_with_refs.html#jp")); |
| 512 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 466 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 513 &mixed_content_state)); | 467 &mixed_content_state)); |
| 514 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 468 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 515 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, | 469 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, |
| 516 cert_status & net::CERT_STATUS_ALL_ERRORS); | 470 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 517 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 471 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 518 } | 472 } |
| 519 | 473 |
| 520 // Tests that closing a page that has a unsafe pop-up does not crash the browser | 474 // Tests that closing a page that has a unsafe pop-up does not crash the browser |
| 521 // (bug #1966). | 475 // (bug #1966). |
| 522 // Disabled because flaky (bug #2136). | 476 // Disabled because flaky (bug #2136). |
| 523 TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) { | 477 TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) { |
| 524 TestServer http_server(kDocRoot); | 478 scoped_ptr<TestServer> http_server(PlainServer()); |
| 525 HTTPSTestServer bad_https_server = BadServer(); | 479 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 526 | 480 |
| 527 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 481 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 528 NavigateTab(tab.get(), | 482 NavigateTab(tab.get(), |
| 529 http_server.TestServerPageW( | 483 http_server->TestServerPageW( |
| 530 L"files/ssl/page_with_unsafe_popup.html")); | 484 L"files/ssl/page_with_unsafe_popup.html")); |
| 531 | 485 |
| 532 int popup_count = 0; | 486 int popup_count = 0; |
| 533 EXPECT_TRUE(tab->GetConstrainedWindowCount(&popup_count)); | 487 EXPECT_TRUE(tab->GetConstrainedWindowCount(&popup_count)); |
| 534 EXPECT_EQ(1, popup_count); | 488 EXPECT_EQ(1, popup_count); |
| 535 | 489 |
| 536 // Let's add another tab to make sure the browser does not exit when we close | 490 // Let's add another tab to make sure the browser does not exit when we close |
| 537 // the first tab. | 491 // the first tab. |
| 538 scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); | 492 scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
| 539 EXPECT_TRUE(browser_proxy.get()); | 493 EXPECT_TRUE(browser_proxy.get()); |
| 540 browser_proxy->AppendTab( | 494 browser_proxy->AppendTab( |
| 541 http_server.TestServerPageW(L"files/ssl/google.html")); | 495 http_server->TestServerPageW(L"files/ssl/google.html")); |
| 542 | 496 |
| 543 // Close the first tab. | 497 // Close the first tab. |
| 544 tab->Close(); | 498 tab->Close(); |
| 545 } | 499 } |
| 546 | 500 |
| 547 // Visit a page over bad https that is a redirect to a page with good https. | 501 // Visit a page over bad https that is a redirect to a page with good https. |
| 548 TEST_F(SSLUITest, TestRedirectBadToGoodHTTPS) { | 502 TEST_F(SSLUITest, TestRedirectBadToGoodHTTPS) { |
| 549 HTTPSTestServer good_https_server = GoodServer(); | 503 scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer()); |
| 550 HTTPSTestServer bad_https_server = BadServer(); | 504 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 551 | 505 |
| 552 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 506 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 553 GURL url1 = bad_https_server.TestServerPageW(L"server-redirect?"); | 507 GURL url1 = bad_https_server->TestServerPageW(L"server-redirect?"); |
| 554 GURL url2 = good_https_server.TestServerPageW(L"files/ssl/google.html"); | 508 GURL url2 = good_https_server->TestServerPageW(L"files/ssl/google.html"); |
| 555 NavigateTab(tab.get(), GURL(url1.spec() + url2.spec())); | 509 NavigateTab(tab.get(), GURL(url1.spec() + url2.spec())); |
| 556 | 510 |
| 557 NavigationEntry::PageType page_type; | 511 NavigationEntry::PageType page_type; |
| 558 EXPECT_TRUE(tab->GetPageType(&page_type)); | 512 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 559 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); | 513 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); |
| 560 | 514 |
| 561 SecurityStyle security_style; | 515 SecurityStyle security_style; |
| 562 int cert_status; | 516 int cert_status; |
| 563 int mixed_content_state; | 517 int mixed_content_state; |
| 564 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 518 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 565 &mixed_content_state)); | 519 &mixed_content_state)); |
| 566 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 520 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 567 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, cert_status); | 521 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, cert_status); |
| 568 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 522 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 569 | 523 |
| 570 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); | 524 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); |
| 571 // We have been redirected to the good page. | 525 // We have been redirected to the good page. |
| 572 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 526 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 573 &mixed_content_state)); | 527 &mixed_content_state)); |
| 574 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 528 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 575 EXPECT_EQ(0, | 529 EXPECT_EQ(0, |
| 576 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. | 530 cert_status & net::CERT_STATUS_ALL_ERRORS); // No errors expected. |
| 577 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 531 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 578 } | 532 } |
| 579 | 533 |
| 580 // Visit a page over good https that is a redirect to a page with bad https. | 534 // Visit a page over good https that is a redirect to a page with bad https. |
| 581 TEST_F(SSLUITest, TestRedirectGoodToBadHTTPS) { | 535 TEST_F(SSLUITest, TestRedirectGoodToBadHTTPS) { |
| 582 HTTPSTestServer good_https_server = GoodServer(); | 536 scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer()); |
| 583 HTTPSTestServer bad_https_server = BadServer(); | 537 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 584 | 538 |
| 585 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 539 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 586 GURL url1 = good_https_server.TestServerPageW(L"server-redirect?"); | 540 GURL url1 = good_https_server->TestServerPageW(L"server-redirect?"); |
| 587 GURL url2 = bad_https_server.TestServerPageW(L"files/ssl/google.html"); | 541 GURL url2 = bad_https_server->TestServerPageW(L"files/ssl/google.html"); |
| 588 NavigateTab(tab.get(), GURL(url1.spec() + url2.spec())); | 542 NavigateTab(tab.get(), GURL(url1.spec() + url2.spec())); |
| 589 | 543 |
| 590 NavigationEntry::PageType page_type; | 544 NavigationEntry::PageType page_type; |
| 591 EXPECT_TRUE(tab->GetPageType(&page_type)); | 545 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 592 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); | 546 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); |
| 593 | 547 |
| 594 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); | 548 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); |
| 595 | 549 |
| 596 SecurityStyle security_style; | 550 SecurityStyle security_style; |
| 597 int cert_status; | 551 int cert_status; |
| 598 int mixed_content_state; | 552 int mixed_content_state; |
| 599 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 553 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 600 &mixed_content_state)); | 554 &mixed_content_state)); |
| 601 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 555 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 602 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, | 556 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, |
| 603 cert_status & net::CERT_STATUS_ALL_ERRORS); | 557 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 604 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 558 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 605 } | 559 } |
| 606 | 560 |
| 607 // Visit a page over http that is a redirect to a page with https (good and | 561 // Visit a page over http that is a redirect to a page with https (good and |
| 608 // bad). | 562 // bad). |
| 609 TEST_F(SSLUITest, TestRedirectHTTPToHTTPS) { | 563 TEST_F(SSLUITest, TestRedirectHTTPToHTTPS) { |
| 610 TestServer http_server(kDocRoot); | 564 scoped_ptr<TestServer> http_server(PlainServer()); |
| 611 HTTPSTestServer good_https_server = GoodServer(); | 565 scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer()); |
| 612 HTTPSTestServer bad_https_server = BadServer(); | 566 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 613 | 567 |
| 614 // HTTP redirects to good HTTPS. | 568 // HTTP redirects to good HTTPS. |
| 615 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 569 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 616 GURL http_url = http_server.TestServerPageW(L"server-redirect?"); | 570 GURL http_url = http_server->TestServerPageW(L"server-redirect?"); |
| 617 GURL good_https_url = | 571 GURL good_https_url = |
| 618 good_https_server.TestServerPageW(L"files/ssl/google.html"); | 572 good_https_server->TestServerPageW(L"files/ssl/google.html"); |
| 619 NavigateTab(tab.get(), GURL(http_url.spec() + good_https_url.spec())); | 573 NavigateTab(tab.get(), GURL(http_url.spec() + good_https_url.spec())); |
| 620 | 574 |
| 621 SecurityStyle security_style; | 575 SecurityStyle security_style; |
| 622 int cert_status; | 576 int cert_status; |
| 623 int mixed_content_state; | 577 int mixed_content_state; |
| 624 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 578 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 625 &mixed_content_state)); | 579 &mixed_content_state)); |
| 626 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 580 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 627 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); | 581 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 628 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 582 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 629 | 583 |
| 630 // HTTP redirects to bad HTTPS. | 584 // HTTP redirects to bad HTTPS. |
| 631 GURL bad_https_url = | 585 GURL bad_https_url = |
| 632 bad_https_server.TestServerPageW(L"files/ssl/google.html"); | 586 bad_https_server->TestServerPageW(L"files/ssl/google.html"); |
| 633 NavigateTab(tab.get(), GURL(http_url.spec() + bad_https_url.spec())); | 587 NavigateTab(tab.get(), GURL(http_url.spec() + bad_https_url.spec())); |
| 634 | 588 |
| 635 NavigationEntry::PageType page_type; | 589 NavigationEntry::PageType page_type; |
| 636 EXPECT_TRUE(tab->GetPageType(&page_type)); | 590 EXPECT_TRUE(tab->GetPageType(&page_type)); |
| 637 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); | 591 EXPECT_EQ(page_type, NavigationEntry::INTERSTITIAL_PAGE); |
| 638 | 592 |
| 639 // Continue on the interstitial. | 593 // Continue on the interstitial. |
| 640 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); | 594 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); |
| 641 | 595 |
| 642 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 596 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 643 &mixed_content_state)); | 597 &mixed_content_state)); |
| 644 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 598 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 645 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, | 599 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, |
| 646 cert_status & net::CERT_STATUS_ALL_ERRORS); | 600 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 647 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 601 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 648 } | 602 } |
| 649 | 603 |
| 650 // Visit a page over https that is a redirect to a page with http (to make sure | 604 // Visit a page over https that is a redirect to a page with http (to make sure |
| 651 // we don't keep the secure state). | 605 // we don't keep the secure state). |
| 652 TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) { | 606 TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) { |
| 653 TestServer http_server(kDocRoot); | 607 scoped_ptr<TestServer> http_server(PlainServer()); |
| 654 HTTPSTestServer https_server = GoodServer(); | 608 scoped_ptr<HTTPSTestServer> https_server(GoodCertServer()); |
| 655 | 609 |
| 656 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 610 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 657 GURL https_url = https_server.TestServerPageW(L"server-redirect?"); | 611 GURL https_url = https_server->TestServerPageW(L"server-redirect?"); |
| 658 GURL http_url = http_server.TestServerPageW(L"files/ssl/google.html"); | 612 GURL http_url = http_server->TestServerPageW(L"files/ssl/google.html"); |
| 659 NavigateTab(tab.get(), GURL(https_url.spec() + http_url.spec())); | 613 NavigateTab(tab.get(), GURL(https_url.spec() + http_url.spec())); |
| 660 | 614 |
| 661 SecurityStyle security_style; | 615 SecurityStyle security_style; |
| 662 int cert_status; | 616 int cert_status; |
| 663 int mixed_content_state; | 617 int mixed_content_state; |
| 664 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 618 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 665 &mixed_content_state)); | 619 &mixed_content_state)); |
| 666 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); | 620 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); |
| 667 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); | 621 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 668 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 622 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| (...skipping 27 matching lines...) Expand all Loading... |
| 696 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 650 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 697 } | 651 } |
| 698 | 652 |
| 699 // | 653 // |
| 700 // Frame navigation | 654 // Frame navigation |
| 701 // | 655 // |
| 702 | 656 |
| 703 // From a good HTTPS top frame: | 657 // From a good HTTPS top frame: |
| 704 // - navigate to an OK HTTPS frame | 658 // - navigate to an OK HTTPS frame |
| 705 // - navigate to a bad HTTPS (expect unsafe content and filtered frame), then | 659 // - navigate to a bad HTTPS (expect unsafe content and filtered frame), then |
| 706 // back | 660 // back |
| 707 // - navigate to HTTP (expect mixed content), then back | 661 // - navigate to HTTP (expect mixed content), then back |
| 708 TEST_F(SSLUITest, TestGoodFrameNavigation) { | 662 TEST_F(SSLUITest, TestGoodFrameNavigation) { |
| 709 TestServer http_server(kDocRoot); | 663 scoped_ptr<TestServer> http_server(PlainServer()); |
| 710 HTTPSTestServer good_https_server = GoodServer(); | 664 scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer()); |
| 711 HTTPSTestServer bad_https_server = BadServer(); | 665 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 712 | 666 |
| 713 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 667 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 714 NavigateTab(tab.get(), | 668 NavigateTab(tab.get(), |
| 715 good_https_server.TestServerPageW(L"files/ssl/top_frame.html")); | 669 good_https_server->TestServerPageW(L"files/ssl/top_frame.html")); |
| 716 | 670 |
| 717 SecurityStyle security_style; | 671 SecurityStyle security_style; |
| 718 int cert_status; | 672 int cert_status; |
| 719 int mixed_content_state; | 673 int mixed_content_state; |
| 720 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 674 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 721 &mixed_content_state)); | 675 &mixed_content_state)); |
| 722 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 676 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 723 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); | 677 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 724 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 678 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 725 | 679 |
| (...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 795 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 749 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 796 &mixed_content_state)); | 750 &mixed_content_state)); |
| 797 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); | 751 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATED, security_style); |
| 798 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); | 752 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 799 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 753 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 800 } | 754 } |
| 801 | 755 |
| 802 // From a bad HTTPS top frame: | 756 // From a bad HTTPS top frame: |
| 803 // - navigate to an OK HTTPS frame (expected to be still authentication broken). | 757 // - navigate to an OK HTTPS frame (expected to be still authentication broken). |
| 804 TEST_F(SSLUITest, TestBadFrameNavigation) { | 758 TEST_F(SSLUITest, TestBadFrameNavigation) { |
| 805 HTTPSTestServer good_https_server = GoodServer(); | 759 scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer()); |
| 806 HTTPSTestServer bad_https_server = BadServer(); | 760 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 807 | 761 |
| 808 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 762 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 809 NavigateTab(tab.get(), | 763 NavigateTab(tab.get(), |
| 810 bad_https_server.TestServerPageW(L"files/ssl/top_frame.html")); | 764 bad_https_server->TestServerPageW(L"files/ssl/top_frame.html")); |
| 811 | 765 |
| 812 SecurityStyle security_style; | 766 SecurityStyle security_style; |
| 813 int cert_status; | 767 int cert_status; |
| 814 int mixed_content_state; | 768 int mixed_content_state; |
| 815 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 769 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 816 &mixed_content_state)); | 770 &mixed_content_state)); |
| 817 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 771 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 818 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, | 772 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, |
| 819 cert_status & net::CERT_STATUS_ALL_ERRORS); | 773 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 820 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 774 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 821 | 775 |
| 822 // Continue on the interstitial. | 776 // Continue on the interstitial. |
| 823 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); | 777 EXPECT_TRUE(tab->TakeActionOnSSLBlockingPage(true)); |
| 824 | 778 |
| 825 // Navigate to a good frame. | 779 // Navigate to a good frame. |
| 826 bool success = false; | 780 bool success = false; |
| 827 int64 last_nav_time = 0; | 781 int64 last_nav_time = 0; |
| 828 EXPECT_TRUE(tab->GetLastNavigationTime(&last_nav_time)); | 782 EXPECT_TRUE(tab->GetLastNavigationTime(&last_nav_time)); |
| 829 EXPECT_TRUE(tab->ExecuteAndExtractBool(L"", | 783 EXPECT_TRUE(tab->ExecuteAndExtractBool(L"", |
| 830 L"window.domAutomationController.send(clickLink('goodHTTPSLink'));", | 784 L"window.domAutomationController.send(clickLink('goodHTTPSLink'));", |
| 831 &success)); | 785 &success)); |
| 832 EXPECT_TRUE(success); | 786 EXPECT_TRUE(success); |
| 833 EXPECT_TRUE(tab->WaitForNavigation(last_nav_time)); | 787 EXPECT_TRUE(tab->WaitForNavigation(last_nav_time)); |
| 834 | 788 |
| 835 // We should still be authentication broken. | 789 // We should still be authentication broken. |
| 836 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 790 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 837 &mixed_content_state)); | 791 &mixed_content_state)); |
| 838 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); | 792 EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN, security_style); |
| 839 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, | 793 EXPECT_EQ(net::CERT_STATUS_DATE_INVALID, |
| 840 cert_status & net::CERT_STATUS_ALL_ERRORS); | 794 cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 841 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 795 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 842 } | 796 } |
| 843 | 797 |
| 844 // From an HTTP top frame, navigate to good and bad HTTPS (security state should | 798 // From an HTTP top frame, navigate to good and bad HTTPS (security state should |
| 845 // stay unauthenticated). | 799 // stay unauthenticated). |
| 846 TEST_F(SSLUITest, TestUnauthenticatedFrameNavigation) { | 800 TEST_F(SSLUITest, TestUnauthenticatedFrameNavigation) { |
| 847 TestServer http_server(kDocRoot); | 801 scoped_ptr<TestServer> http_server(PlainServer()); |
| 848 HTTPSTestServer good_https_server = GoodServer(); | 802 scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer()); |
| 849 HTTPSTestServer bad_https_server = BadServer(); | 803 scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer()); |
| 850 | 804 |
| 851 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); | 805 scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
| 852 NavigateTab(tab.get(), | 806 NavigateTab(tab.get(), |
| 853 http_server.TestServerPageW(L"files/ssl/top_frame.html")); | 807 http_server->TestServerPageW(L"files/ssl/top_frame.html")); |
| 854 | 808 |
| 855 SecurityStyle security_style; | 809 SecurityStyle security_style; |
| 856 int cert_status; | 810 int cert_status; |
| 857 int mixed_content_state; | 811 int mixed_content_state; |
| 858 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, | 812 EXPECT_TRUE(tab->GetSecurityState(&security_style, &cert_status, |
| 859 &mixed_content_state)); | 813 &mixed_content_state)); |
| 860 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); | 814 EXPECT_EQ(SECURITY_STYLE_UNAUTHENTICATED, security_style); |
| 861 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); | 815 EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
| 862 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); | 816 EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
| 863 | 817 |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 899 std::wstring is_frame_evil_js( | 853 std::wstring is_frame_evil_js( |
| 900 L"window.domAutomationController" | 854 L"window.domAutomationController" |
| 901 L".send(document.getElementById('evilDiv') != null);"); | 855 L".send(document.getElementById('evilDiv') != null);"); |
| 902 EXPECT_TRUE(tab->ExecuteAndExtractBool(content_frame_xpath, | 856 EXPECT_TRUE(tab->ExecuteAndExtractBool(content_frame_xpath, |
| 903 is_frame_evil_js, | 857 is_frame_evil_js, |
| 904 &is_content_evil)); | 858 &is_content_evil)); |
| 905 EXPECT_FALSE(is_content_evil); | 859 EXPECT_FALSE(is_content_evil); |
| 906 } | 860 } |
| 907 | 861 |
| 908 | 862 |
| 909 // TODO (jcampan): more tests to do below. | 863 // TODO(jcampan): more tests to do below. |
| 910 | 864 |
| 911 // Visit a page over https that contains a frame with a redirect. | 865 // Visit a page over https that contains a frame with a redirect. |
| 912 | 866 |
| 913 // XMLHttpRequest mixed in synchronous mode. | 867 // XMLHttpRequest mixed in synchronous mode. |
| 914 | 868 |
| 915 // XMLHttpRequest mixed in asynchronous mode. | 869 // XMLHttpRequest mixed in asynchronous mode. |
| 916 | 870 |
| 917 // XMLHttpRequest over bad ssl in synchronous mode. | 871 // XMLHttpRequest over bad ssl in synchronous mode. |
| 918 | 872 |
| 919 // XMLHttpRequest over OK ssl in synchronous mode. | 873 // XMLHttpRequest over OK ssl in synchronous mode. |
| OLD | NEW |