Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(24)

Side by Side Diff: chrome/browser/ssl/ssl_browser_tests.cc

Issue 9414024: Fix flaky SSLUI tests (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Created 8 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/command_line.h" 5 #include "base/command_line.h"
6 #include "base/time.h" 6 #include "base/time.h"
7 #include "chrome/app/chrome_command_ids.h" 7 #include "chrome/app/chrome_command_ids.h"
8 #include "chrome/browser/tabs/tab_strip_model.h" 8 #include "chrome/browser/tabs/tab_strip_model.h"
9 #include "chrome/browser/ui/browser.h" 9 #include "chrome/browser/ui/browser.h"
10 #include "chrome/browser/ui/browser_navigator.h" 10 #include "chrome/browser/ui/browser_navigator.h"
(...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after
92 ASSERT_TRUE(entry); 92 ASSERT_TRUE(entry);
93 EXPECT_EQ(interstitial ? 93 EXPECT_EQ(interstitial ?
94 content::PAGE_TYPE_INTERSTITIAL : content::PAGE_TYPE_NORMAL, 94 content::PAGE_TYPE_INTERSTITIAL : content::PAGE_TYPE_NORMAL,
95 entry->GetPageType()); 95 entry->GetPageType());
96 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN, 96 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN,
97 entry->GetSSL().security_style); 97 entry->GetSSL().security_style);
98 // CERT_STATUS_UNABLE_TO_CHECK_REVOCATION doesn't lower the security style 98 // CERT_STATUS_UNABLE_TO_CHECK_REVOCATION doesn't lower the security style
99 // to SECURITY_STYLE_AUTHENTICATION_BROKEN. 99 // to SECURITY_STYLE_AUTHENTICATION_BROKEN.
100 ASSERT_NE(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION, error); 100 ASSERT_NE(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION, error);
101 EXPECT_EQ(error, 101 EXPECT_EQ(error,
102 error &
102 entry->GetSSL().cert_status & net::CERT_STATUS_ALL_ERRORS); 103 entry->GetSSL().cert_status & net::CERT_STATUS_ALL_ERRORS);
wtc 2012/02/17 00:14:07 If you want to allow extraneous certificate errors
tpayne 2012/02/17 19:25:47 Done.
103 EXPECT_FALSE(!!(entry->GetSSL().content_status & 104 EXPECT_FALSE(!!(entry->GetSSL().content_status &
104 SSLStatus::DISPLAYED_INSECURE_CONTENT)); 105 SSLStatus::DISPLAYED_INSECURE_CONTENT));
105 EXPECT_EQ(ran_insecure_content, 106 EXPECT_EQ(ran_insecure_content,
106 !!(entry->GetSSL().content_status & SSLStatus::RAN_INSECURE_CONTENT)); 107 !!(entry->GetSSL().content_status & SSLStatus::RAN_INSECURE_CONTENT));
108 unsigned int extra_cert_errors = error ^ (entry->GetSSL().cert_status &
wtc 2012/02/17 00:14:07 Nit: it looks nicer to use net::CertStatus instead
tpayne 2012/02/17 19:25:47 Done.
109 net::CERT_STATUS_ALL_ERRORS);
110 if (extra_cert_errors) {
111 LOG(WARNING) << "Got unexpected cert error: " << extra_cert_errors;
112 }
wtc 2012/02/17 00:14:07 Nit: this file seems to omit curly braces for one-
tpayne 2012/02/17 19:25:47 Done.
107 } 113 }
108 114
109 void CheckWorkerLoadResult(WebContents* tab, bool expectLoaded) { 115 void CheckWorkerLoadResult(WebContents* tab, bool expectLoaded) {
110 // Workers are async and we don't have notifications for them passing 116 // Workers are async and we don't have notifications for them passing
111 // messages since they do it between renderer and worker processes. 117 // messages since they do it between renderer and worker processes.
112 // So have a polling loop, check every 200ms, timeout at 30s. 118 // So have a polling loop, check every 200ms, timeout at 30s.
113 const int timeout_ms = 200; 119 const int timeout_ms = 200;
114 base::Time timeToQuit = base::Time::Now() + 120 base::Time timeToQuit = base::Time::Now() +
115 base::TimeDelta::FromMilliseconds(30000); 121 base::TimeDelta::FromMilliseconds(30000);
116 122
(...skipping 190 matching lines...) Expand 10 before | Expand all | Expand 10 after
307 true); // Interstitial showing 313 true); // Interstitial showing
308 314
309 ProceedThroughInterstitial(tab); 315 ProceedThroughInterstitial(tab);
310 316
311 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 317 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
312 false); // No interstitial showing 318 false); // No interstitial showing
313 } 319 }
314 320
315 // Visits a page with https error and don't proceed (and ensure we can still 321 // Visits a page with https error and don't proceed (and ensure we can still
316 // navigate at that point): 322 // navigate at that point):
317 // Disabled, flakily exceeds test timeout, http://crbug.com/43575. 323 IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndDontProceed) {
318 // Marked as flaky, see bug 40932.
319 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestHTTPSExpiredCertAndDontProceed) {
320 ASSERT_TRUE(test_server()->Start()); 324 ASSERT_TRUE(test_server()->Start());
321 ASSERT_TRUE(https_server_.Start()); 325 ASSERT_TRUE(https_server_.Start());
322 ASSERT_TRUE(https_server_expired_.Start()); 326 ASSERT_TRUE(https_server_expired_.Start());
323 327
324 // First navigate to an OK page. 328 // First navigate to an OK page.
325 ui_test_utils::NavigateToURL(browser(), 329 ui_test_utils::NavigateToURL(browser(),
326 https_server_.GetURL("files/ssl/google.html")); 330 https_server_.GetURL("files/ssl/google.html"));
327 331
328 WebContents* tab = browser()->GetSelectedWebContents(); 332 WebContents* tab = browser()->GetSelectedWebContents();
329 NavigationEntry* entry = tab->GetController().GetActiveEntry(); 333 NavigationEntry* entry = tab->GetController().GetActiveEntry();
(...skipping 24 matching lines...) Expand all
354 // We should be back to the original good page. 358 // We should be back to the original good page.
355 CheckAuthenticatedState(tab, false); 359 CheckAuthenticatedState(tab, false);
356 360
357 // Try to navigate to a new page. (to make sure bug 5800 is fixed). 361 // Try to navigate to a new page. (to make sure bug 5800 is fixed).
358 ui_test_utils::NavigateToURL(browser(), 362 ui_test_utils::NavigateToURL(browser(),
359 test_server()->GetURL("files/ssl/google.html")); 363 test_server()->GetURL("files/ssl/google.html"));
360 CheckUnauthenticatedState(tab); 364 CheckUnauthenticatedState(tab);
361 } 365 }
362 366
363 // Visits a page with https error and then goes back using Browser::GoBack. 367 // Visits a page with https error and then goes back using Browser::GoBack.
364 // See bug 114185. 368 // See bug 114185.
dpapad 2012/02/16 23:48:22 Could you also remove this comment and add the bug
wtc 2012/02/17 00:14:07 I believe we need to keep the "See bug 114185." co
tpayne 2012/02/17 19:25:47 I think Demetrios is right. Bug 114185 seems to be
tpayne 2012/02/17 19:25:47 Done.
365 // Marked as flaky, see bug 40932.
366 IN_PROC_BROWSER_TEST_F(SSLUITest, 369 IN_PROC_BROWSER_TEST_F(SSLUITest,
367 DISABLED_TestHTTPSExpiredCertAndGoBackViaButton) { 370 TestHTTPSExpiredCertAndGoBackViaButton) {
368 ASSERT_TRUE(test_server()->Start()); 371 ASSERT_TRUE(test_server()->Start());
369 ASSERT_TRUE(https_server_expired_.Start()); 372 ASSERT_TRUE(https_server_expired_.Start());
370 373
371 // First navigate to an HTTP page. 374 // First navigate to an HTTP page.
372 ui_test_utils::NavigateToURL(browser(), 375 ui_test_utils::NavigateToURL(browser(),
373 test_server()->GetURL("files/ssl/google.html")); 376 test_server()->GetURL("files/ssl/google.html"));
374 WebContents* tab = browser()->GetSelectedWebContents(); 377 WebContents* tab = browser()->GetSelectedWebContents();
375 NavigationEntry* entry = tab->GetController().GetActiveEntry(); 378 NavigationEntry* entry = tab->GetController().GetActiveEntry();
376 ASSERT_TRUE(entry); 379 ASSERT_TRUE(entry);
377 380
(...skipping 15 matching lines...) Expand all
393 load_failed_observer.Wait(); 396 load_failed_observer.Wait();
394 EXPECT_FALSE(tab->GetRenderViewHost()->is_swapped_out()); 397 EXPECT_FALSE(tab->GetRenderViewHost()->is_swapped_out());
395 398
396 // We should be back at the original good page. 399 // We should be back at the original good page.
397 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage()); 400 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage());
398 CheckUnauthenticatedState(tab); 401 CheckUnauthenticatedState(tab);
399 } 402 }
400 403
401 // Visits a page with https error and then goes back using GoToOffset. 404 // Visits a page with https error and then goes back using GoToOffset.
402 // See bug 114185. 405 // See bug 114185.
403 // Marked as flaky, see bug 40932.
404 IN_PROC_BROWSER_TEST_F(SSLUITest, 406 IN_PROC_BROWSER_TEST_F(SSLUITest,
405 DISABLED_TestHTTPSExpiredCertAndGoBackViaMenu) { 407 TestHTTPSExpiredCertAndGoBackViaMenu) {
406 ASSERT_TRUE(test_server()->Start()); 408 ASSERT_TRUE(test_server()->Start());
407 ASSERT_TRUE(https_server_expired_.Start()); 409 ASSERT_TRUE(https_server_expired_.Start());
408 410
409 // First navigate to an HTTP page. 411 // First navigate to an HTTP page.
410 ui_test_utils::NavigateToURL(browser(), 412 ui_test_utils::NavigateToURL(browser(),
411 test_server()->GetURL("files/ssl/google.html")); 413 test_server()->GetURL("files/ssl/google.html"));
412 WebContents* tab = browser()->GetSelectedWebContents(); 414 WebContents* tab = browser()->GetSelectedWebContents();
413 NavigationEntry* entry = tab->GetController().GetActiveEntry(); 415 NavigationEntry* entry = tab->GetController().GetActiveEntry();
414 ASSERT_TRUE(entry); 416 ASSERT_TRUE(entry);
415 417
416 // Now go to a bad HTTPS page that shows an interstitial. 418 // Now go to a bad HTTPS page that shows an interstitial.
417 ui_test_utils::NavigateToURL(browser(), 419 ui_test_utils::NavigateToURL(browser(),
418 https_server_expired_.GetURL("files/ssl/google.html")); 420 https_server_expired_.GetURL("files/ssl/google.html"));
419 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 421 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
420 true); // Interstitial showing 422 true); // Interstitial showing
421 423
422 // Simulate user clicking and holding on back button (crbug.com/37215). 424 // Simulate user clicking and holding on back button (crbug.com/37215).
423 tab->GetController().GoToOffset(-1); 425 tab->GetController().GoToOffset(-1);
424 426
425 // We should be back at the original good page. 427 // We should be back at the original good page.
426 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage()); 428 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage());
427 CheckUnauthenticatedState(tab); 429 CheckUnauthenticatedState(tab);
428 } 430 }
429 431
430 // Visits a page with https error and then goes forward using GoToOffset. 432 // Visits a page with https error and then goes forward using GoToOffset.
431 // Marked as flaky, see bug 40932. 433 IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) {
432 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestHTTPSExpiredCertAndGoForward) {
433 ASSERT_TRUE(test_server()->Start()); 434 ASSERT_TRUE(test_server()->Start());
434 ASSERT_TRUE(https_server_expired_.Start()); 435 ASSERT_TRUE(https_server_expired_.Start());
435 436
436 // First navigate to two HTTP pages. 437 // First navigate to two HTTP pages.
437 ui_test_utils::NavigateToURL(browser(), 438 ui_test_utils::NavigateToURL(browser(),
438 test_server()->GetURL("files/ssl/google.html")); 439 test_server()->GetURL("files/ssl/google.html"));
439 WebContents* tab = browser()->GetSelectedWebContents(); 440 WebContents* tab = browser()->GetSelectedWebContents();
440 NavigationEntry* entry1 = tab->GetController().GetActiveEntry(); 441 NavigationEntry* entry1 = tab->GetController().GetActiveEntry();
441 ASSERT_TRUE(entry1); 442 ASSERT_TRUE(entry1);
442 ui_test_utils::NavigateToURL(browser(), 443 ui_test_utils::NavigateToURL(browser(),
(...skipping 141 matching lines...) Expand 10 before | Expand all | Expand 10 after
584 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( 585 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
585 "files/ssl/page_runs_insecure_content.html")); 586 "files/ssl/page_runs_insecure_content.html"));
586 587
587 CheckAuthenticationBrokenState(browser()->GetSelectedWebContents(), 0, true, 588 CheckAuthenticationBrokenState(browser()->GetSelectedWebContents(), 0, true,
588 false); 589 false);
589 } 590 }
590 591
591 // Visits a page with unsafe content and make sure that: 592 // Visits a page with unsafe content and make sure that:
592 // - frames content is replaced with warning 593 // - frames content is replaced with warning
593 // - images and scripts are filtered out entirely 594 // - images and scripts are filtered out entirely
594 // Marked as flaky, see bug 40932. 595 IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) {
595 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnsafeContents) {
596 ASSERT_TRUE(https_server_.Start()); 596 ASSERT_TRUE(https_server_.Start());
597 ASSERT_TRUE(https_server_expired_.Start()); 597 ASSERT_TRUE(https_server_expired_.Start());
598 598
599 std::string replacement_path; 599 std::string replacement_path;
600 ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( 600 ASSERT_TRUE(GetFilePathWithHostAndPortReplacement(
601 "files/ssl/page_with_unsafe_contents.html", 601 "files/ssl/page_with_unsafe_contents.html",
602 https_server_expired_.host_port_pair(), 602 https_server_expired_.host_port_pair(),
603 &replacement_path)); 603 &replacement_path));
604 ui_test_utils::NavigateToURL(browser(), 604 ui_test_utils::NavigateToURL(browser(),
605 https_server_.GetURL(replacement_path)); 605 https_server_.GetURL(replacement_path));
(...skipping 323 matching lines...) Expand 10 before | Expand all | Expand 10 after
929 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 929 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
930 true); // Interstitial showing. 930 true); // Interstitial showing.
931 931
932 ProceedThroughInterstitial(tab); 932 ProceedThroughInterstitial(tab);
933 933
934 // We have been redirected to the good page. 934 // We have been redirected to the good page.
935 CheckAuthenticatedState(tab, false); 935 CheckAuthenticatedState(tab, false);
936 } 936 }
937 937
938 // Visit a page over good https that is a redirect to a page with bad https. 938 // Visit a page over good https that is a redirect to a page with bad https.
939 // Marked as flaky, see bug 40932. 939 IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectGoodToBadHTTPS) {
940 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestRedirectGoodToBadHTTPS) {
941 ASSERT_TRUE(https_server_.Start()); 940 ASSERT_TRUE(https_server_.Start());
942 ASSERT_TRUE(https_server_expired_.Start()); 941 ASSERT_TRUE(https_server_expired_.Start());
943 942
944 GURL url1 = https_server_.GetURL("server-redirect?"); 943 GURL url1 = https_server_.GetURL("server-redirect?");
945 GURL url2 = https_server_expired_.GetURL("files/ssl/google.html"); 944 GURL url2 = https_server_expired_.GetURL("files/ssl/google.html");
946 ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec())); 945 ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec()));
947 946
948 WebContents* tab = browser()->GetSelectedWebContents(); 947 WebContents* tab = browser()->GetSelectedWebContents();
949 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 948 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
950 true); // Interstitial showing. 949 true); // Interstitial showing.
(...skipping 15 matching lines...) Expand all
966 GURL http_url = test_server()->GetURL("server-redirect?"); 965 GURL http_url = test_server()->GetURL("server-redirect?");
967 GURL good_https_url = 966 GURL good_https_url =
968 https_server_.GetURL("files/ssl/google.html"); 967 https_server_.GetURL("files/ssl/google.html");
969 968
970 ui_test_utils::NavigateToURL(browser(), 969 ui_test_utils::NavigateToURL(browser(),
971 GURL(http_url.spec() + good_https_url.spec())); 970 GURL(http_url.spec() + good_https_url.spec()));
972 CheckAuthenticatedState(tab, false); 971 CheckAuthenticatedState(tab, false);
973 } 972 }
974 973
975 // Visit a page over http that is a redirect to a page with bad HTTPS. 974 // Visit a page over http that is a redirect to a page with bad HTTPS.
976 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestRedirectHTTPToBadHTTPS) { 975 IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToBadHTTPS) {
977 ASSERT_TRUE(test_server()->Start()); 976 ASSERT_TRUE(test_server()->Start());
978 ASSERT_TRUE(https_server_expired_.Start()); 977 ASSERT_TRUE(https_server_expired_.Start());
979 978
980 WebContents* tab = browser()->GetSelectedWebContents(); 979 WebContents* tab = browser()->GetSelectedWebContents();
981 980
982 GURL http_url = test_server()->GetURL("server-redirect?"); 981 GURL http_url = test_server()->GetURL("server-redirect?");
983 GURL bad_https_url = 982 GURL bad_https_url =
984 https_server_expired_.GetURL("files/ssl/google.html"); 983 https_server_expired_.GetURL("files/ssl/google.html");
985 ui_test_utils::NavigateToURL(browser(), 984 ui_test_utils::NavigateToURL(browser(),
986 GURL(http_url.spec() + bad_https_url.spec())); 985 GURL(http_url.spec() + bad_https_url.spec()));
987 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 986 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
988 true); // Interstitial showing. 987 true); // Interstitial showing.
989 988
990 ProceedThroughInterstitial(tab); 989 ProceedThroughInterstitial(tab);
991 990
992 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 991 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
993 false); // No interstitial showing. 992 false); // No interstitial showing.
994 } 993 }
995 994
996 // Visit a page over https that is a redirect to a page with http (to make sure 995 // Visit a page over https that is a redirect to a page with http (to make sure
997 // we don't keep the secure state). 996 // we don't keep the secure state).
998 // Marked as flaky, see bug 40932. 997 IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) {
999 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestRedirectHTTPSToHTTP) {
1000 ASSERT_TRUE(test_server()->Start()); 998 ASSERT_TRUE(test_server()->Start());
1001 ASSERT_TRUE(https_server_.Start()); 999 ASSERT_TRUE(https_server_.Start());
1002 1000
1003 GURL https_url = https_server_.GetURL("server-redirect?"); 1001 GURL https_url = https_server_.GetURL("server-redirect?");
1004 GURL http_url = test_server()->GetURL("files/ssl/google.html"); 1002 GURL http_url = test_server()->GetURL("files/ssl/google.html");
1005 1003
1006 ui_test_utils::NavigateToURL(browser(), 1004 ui_test_utils::NavigateToURL(browser(),
1007 GURL(https_url.spec() + http_url.spec())); 1005 GURL(https_url.spec() + http_url.spec()));
1008 CheckUnauthenticatedState(browser()->GetSelectedWebContents()); 1006 CheckUnauthenticatedState(browser()->GetSelectedWebContents());
1009 } 1007 }
(...skipping 110 matching lines...) Expand 10 before | Expand all | Expand 10 after
1120 content::NOTIFICATION_LOAD_STOP, 1118 content::NOTIFICATION_LOAD_STOP,
1121 content::Source<NavigationController>(&tab->GetController())); 1119 content::Source<NavigationController>(&tab->GetController()));
1122 tab->GetController().GoBack(); 1120 tab->GetController().GoBack();
1123 observer.Wait(); 1121 observer.Wait();
1124 } 1122 }
1125 CheckAuthenticatedState(tab, true); 1123 CheckAuthenticatedState(tab, true);
1126 } 1124 }
1127 1125
1128 // From a bad HTTPS top frame: 1126 // From a bad HTTPS top frame:
1129 // - navigate to an OK HTTPS frame (expected to be still authentication broken). 1127 // - navigate to an OK HTTPS frame (expected to be still authentication broken).
1130 // Marked as flaky, see bug 40932. 1128 IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) {
1131 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestBadFrameNavigation) {
1132 ASSERT_TRUE(https_server_.Start()); 1129 ASSERT_TRUE(https_server_.Start());
1133 ASSERT_TRUE(https_server_expired_.Start()); 1130 ASSERT_TRUE(https_server_expired_.Start());
1134 1131
1135 std::string top_frame_path; 1132 std::string top_frame_path;
1136 ASSERT_TRUE(GetTopFramePath(*test_server(), 1133 ASSERT_TRUE(GetTopFramePath(*test_server(),
1137 https_server_, 1134 https_server_,
1138 https_server_expired_, 1135 https_server_expired_,
1139 &top_frame_path)); 1136 &top_frame_path));
1140 1137
1141 WebContents* tab = browser()->GetSelectedWebContents(); 1138 WebContents* tab = browser()->GetSelectedWebContents();
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after
1220 bool is_content_evil = true; 1217 bool is_content_evil = true;
1221 std::wstring content_frame_xpath(L"html/frameset/frame[2]"); 1218 std::wstring content_frame_xpath(L"html/frameset/frame[2]");
1222 std::wstring is_evil_js(L"window.domAutomationController.send(" 1219 std::wstring is_evil_js(L"window.domAutomationController.send("
1223 L"document.getElementById('evilDiv') != null);"); 1220 L"document.getElementById('evilDiv') != null);");
1224 EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool( 1221 EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
1225 tab->GetRenderViewHost(), content_frame_xpath, is_evil_js, 1222 tab->GetRenderViewHost(), content_frame_xpath, is_evil_js,
1226 &is_content_evil)); 1223 &is_content_evil));
1227 EXPECT_FALSE(is_content_evil); 1224 EXPECT_FALSE(is_content_evil);
1228 } 1225 }
1229 1226
1230 // Marked as flaky, see bug 40932. 1227 IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerFiltered) {
1231 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnsafeContentsInWorkerFiltered) {
1232 ASSERT_TRUE(https_server_.Start()); 1228 ASSERT_TRUE(https_server_.Start());
1233 ASSERT_TRUE(https_server_expired_.Start()); 1229 ASSERT_TRUE(https_server_expired_.Start());
1234 1230
1235 // This page will spawn a Worker which will try to load content from 1231 // This page will spawn a Worker which will try to load content from
1236 // BadCertServer. 1232 // BadCertServer.
1237 std::string page_with_unsafe_worker_path; 1233 std::string page_with_unsafe_worker_path;
1238 ASSERT_TRUE(GetPageWithUnsafeWorkerPath(https_server_expired_, 1234 ASSERT_TRUE(GetPageWithUnsafeWorkerPath(https_server_expired_,
1239 &page_with_unsafe_worker_path)); 1235 &page_with_unsafe_worker_path));
1240 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( 1236 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
1241 page_with_unsafe_worker_path)); 1237 page_with_unsafe_worker_path));
1242 WebContents* tab = browser()->GetSelectedWebContents(); 1238 WebContents* tab = browser()->GetSelectedWebContents();
1243 // Expect Worker not to load insecure content. 1239 // Expect Worker not to load insecure content.
1244 CheckWorkerLoadResult(tab, false); 1240 CheckWorkerLoadResult(tab, false);
1245 // The bad content is filtered, expect the state to be authenticated. 1241 // The bad content is filtered, expect the state to be authenticated.
1246 CheckAuthenticatedState(tab, false); 1242 CheckAuthenticatedState(tab, false);
1247 } 1243 }
1248 1244
1249 // Marked as flaky, see bug 40932. 1245 IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorker) {
1250 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnsafeContentsInWorker) {
1251 ASSERT_TRUE(https_server_.Start()); 1246 ASSERT_TRUE(https_server_.Start());
1252 ASSERT_TRUE(https_server_expired_.Start()); 1247 ASSERT_TRUE(https_server_expired_.Start());
1253 1248
1254 // Navigate to an unsafe site. Proceed with interstitial page to indicate 1249 // Navigate to an unsafe site. Proceed with interstitial page to indicate
1255 // the user approves the bad certificate. 1250 // the user approves the bad certificate.
1256 ui_test_utils::NavigateToURL(browser(), 1251 ui_test_utils::NavigateToURL(browser(),
1257 https_server_expired_.GetURL("files/ssl/blank_page.html")); 1252 https_server_expired_.GetURL("files/ssl/blank_page.html"));
1258 WebContents* tab = browser()->GetSelectedWebContents(); 1253 WebContents* tab = browser()->GetSelectedWebContents();
1259 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 1254 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
1260 true); // Interstitial showing 1255 true); // Interstitial showing
(...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after
1337 1332
1338 // Visit a page over https that contains a frame with a redirect. 1333 // Visit a page over https that contains a frame with a redirect.
1339 1334
1340 // XMLHttpRequest insecure content in synchronous mode. 1335 // XMLHttpRequest insecure content in synchronous mode.
1341 1336
1342 // XMLHttpRequest insecure content in asynchronous mode. 1337 // XMLHttpRequest insecure content in asynchronous mode.
1343 1338
1344 // XMLHttpRequest over bad ssl in synchronous mode. 1339 // XMLHttpRequest over bad ssl in synchronous mode.
1345 1340
1346 // XMLHttpRequest over OK ssl in synchronous mode. 1341 // XMLHttpRequest over OK ssl in synchronous mode.
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698