Index: chrome/browser/ssl/ssl_browser_tests.cc |
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc |
index 200989ef441a84bec383233baacd31fefb43a2d9..37155bcf91b2c9ec32fbe2d1d89d213edfe32f1b 100644 |
--- a/chrome/browser/ssl/ssl_browser_tests.cc |
+++ b/chrome/browser/ssl/ssl_browser_tests.cc |
@@ -11,6 +11,7 @@ |
#include "base/metrics/field_trial.h" |
#include "base/prefs/pref_service.h" |
#include "base/single_thread_task_runner.h" |
+#include "base/strings/string_split.h" |
#include "base/strings/string_util.h" |
#include "base/strings/stringprintf.h" |
#include "base/strings/utf_string_conversions.h" |
@@ -76,7 +77,8 @@ |
#include "net/dns/mock_host_resolver.h" |
#include "net/ssl/ssl_info.h" |
#include "net/test/cert_test_util.h" |
-#include "net/test/spawned_test_server/spawned_test_server.h" |
+#include "net/test/embedded_test_server/embedded_test_server.h" |
+#include "net/test/embedded_test_server/request_handler_util.h" |
#include "net/test/test_certificate_data.h" |
#include "net/url_request/url_request_context.h" |
@@ -268,18 +270,21 @@ class SSLUITest |
: public certificate_reporting_test_utils::CertificateReportingTest { |
public: |
SSLUITest() |
- : https_server_(net::SpawnedTestServer::TYPE_HTTPS, |
- SSLOptions(SSLOptions::CERT_OK), |
- base::FilePath(kDocRoot)), |
- https_server_expired_(net::SpawnedTestServer::TYPE_HTTPS, |
- SSLOptions(SSLOptions::CERT_EXPIRED), |
- base::FilePath(kDocRoot)), |
- https_server_mismatched_(net::SpawnedTestServer::TYPE_HTTPS, |
- SSLOptions(SSLOptions::CERT_MISMATCHED_NAME), |
- base::FilePath(kDocRoot)), |
+ : https_server_(net::EmbeddedTestServer::TYPE_HTTPS), |
+ https_server_expired_(net::EmbeddedTestServer::TYPE_HTTPS), |
+ https_server_mismatched_(net::EmbeddedTestServer::TYPE_HTTPS), |
wss_server_expired_(net::SpawnedTestServer::TYPE_WSS, |
SSLOptions(SSLOptions::CERT_EXPIRED), |
- net::GetWebSocketTestDataDirectory()) {} |
+ net::GetWebSocketTestDataDirectory()) { |
+ https_server_.AddDefaultHandlers(base::FilePath(kDocRoot)); |
+ |
+ https_server_expired_.SetSSLConfig(net::EmbeddedTestServer::CERT_EXPIRED); |
+ https_server_expired_.AddDefaultHandlers(base::FilePath(kDocRoot)); |
+ |
+ https_server_mismatched_.SetSSLConfig( |
+ net::EmbeddedTestServer::CERT_MISMATCHED_NAME); |
+ https_server_mismatched_.AddDefaultHandlers(base::FilePath(kDocRoot)); |
+ } |
void SetUpCommandLine(base::CommandLine* command_line) override { |
// Browser will both run and display insecure content. |
@@ -368,31 +373,30 @@ class SSLUITest |
IsDialogActive(); |
} |
- static bool GetFilePathWithHostAndPortReplacement( |
+ static void GetFilePathWithHostAndPortReplacement( |
const std::string& original_file_path, |
const net::HostPortPair& host_port_pair, |
std::string* replacement_path) { |
- std::vector<net::SpawnedTestServer::StringPair> replacement_text; |
+ base::StringPairs replacement_text; |
replacement_text.push_back( |
make_pair("REPLACE_WITH_HOST_AND_PORT", host_port_pair.ToString())); |
- return net::SpawnedTestServer::GetFilePathWithReplacements( |
+ net::test_server::GetFilePathWithReplacements( |
original_file_path, replacement_text, replacement_path); |
} |
- static bool GetTopFramePath(const net::SpawnedTestServer& http_server, |
- const net::SpawnedTestServer& good_https_server, |
- const net::SpawnedTestServer& bad_https_server, |
+ static void GetTopFramePath(const net::EmbeddedTestServer& http_server, |
+ const net::EmbeddedTestServer& good_https_server, |
+ const net::EmbeddedTestServer& bad_https_server, |
std::string* top_frame_path) { |
// The "frame_left.html" page contained in the top_frame.html page contains |
// <a href>'s to three different servers. This sets up all of the |
// replacement text to work with test servers which listen on ephemeral |
// ports. |
- GURL http_url = http_server.GetURL("files/ssl/google.html"); |
- GURL good_https_url = good_https_server.GetURL("files/ssl/google.html"); |
- GURL bad_https_url = bad_https_server.GetURL( |
- "files/ssl/bad_iframe.html"); |
+ GURL http_url = http_server.GetURL("/ssl/google.html"); |
+ GURL good_https_url = good_https_server.GetURL("/ssl/google.html"); |
+ GURL bad_https_url = bad_https_server.GetURL("/ssl/bad_iframe.html"); |
- std::vector<net::SpawnedTestServer::StringPair> replacement_text_frame_left; |
+ base::StringPairs replacement_text_frame_left; |
replacement_text_frame_left.push_back( |
make_pair("REPLACE_WITH_HTTP_PAGE", http_url.spec())); |
replacement_text_frame_left.push_back( |
@@ -400,46 +404,37 @@ class SSLUITest |
replacement_text_frame_left.push_back( |
make_pair("REPLACE_WITH_BAD_HTTPS_PAGE", bad_https_url.spec())); |
std::string frame_left_path; |
- if (!net::SpawnedTestServer::GetFilePathWithReplacements( |
- "frame_left.html", |
- replacement_text_frame_left, |
- &frame_left_path)) |
- return false; |
+ net::test_server::GetFilePathWithReplacements( |
+ "frame_left.html", replacement_text_frame_left, &frame_left_path); |
// Substitute the generated frame_left URL into the top_frame page. |
- std::vector<net::SpawnedTestServer::StringPair> replacement_text_top_frame; |
+ base::StringPairs replacement_text_top_frame; |
replacement_text_top_frame.push_back( |
make_pair("REPLACE_WITH_FRAME_LEFT_PATH", frame_left_path)); |
- return net::SpawnedTestServer::GetFilePathWithReplacements( |
- "files/ssl/top_frame.html", |
- replacement_text_top_frame, |
- top_frame_path); |
+ net::test_server::GetFilePathWithReplacements( |
+ "/ssl/top_frame.html", replacement_text_top_frame, top_frame_path); |
} |
- static bool GetPageWithUnsafeWorkerPath( |
- const net::SpawnedTestServer& https_server, |
+ static void GetPageWithUnsafeWorkerPath( |
+ const net::EmbeddedTestServer& https_server, |
std::string* page_with_unsafe_worker_path) { |
// Get the "imported.js" URL from the expired https server and |
// substitute it into the unsafe_worker.js file. |
- GURL imported_js_url = https_server.GetURL("files/ssl/imported.js"); |
- std::vector<net::SpawnedTestServer::StringPair> |
- replacement_text_for_unsafe_worker; |
+ GURL imported_js_url = https_server.GetURL("/ssl/imported.js"); |
+ base::StringPairs replacement_text_for_unsafe_worker; |
replacement_text_for_unsafe_worker.push_back( |
make_pair("REPLACE_WITH_IMPORTED_JS_URL", imported_js_url.spec())); |
std::string unsafe_worker_path; |
- if (!net::SpawnedTestServer::GetFilePathWithReplacements( |
- "unsafe_worker.js", |
- replacement_text_for_unsafe_worker, |
- &unsafe_worker_path)) |
- return false; |
+ net::test_server::GetFilePathWithReplacements( |
+ "unsafe_worker.js", replacement_text_for_unsafe_worker, |
+ &unsafe_worker_path); |
// Now, substitute this into the page with unsafe worker. |
- std::vector<net::SpawnedTestServer::StringPair> |
- replacement_text_for_page_with_unsafe_worker; |
+ base::StringPairs replacement_text_for_page_with_unsafe_worker; |
replacement_text_for_page_with_unsafe_worker.push_back( |
make_pair("REPLACE_WITH_UNSAFE_WORKER_PATH", unsafe_worker_path)); |
- return net::SpawnedTestServer::GetFilePathWithReplacements( |
- "files/ssl/page_with_unsafe_worker.html", |
+ net::test_server::GetFilePathWithReplacements( |
+ "/ssl/page_with_unsafe_worker.html", |
replacement_text_for_page_with_unsafe_worker, |
page_with_unsafe_worker_path); |
} |
@@ -550,9 +545,9 @@ class SSLUITest |
} |
} |
- net::SpawnedTestServer https_server_; |
- net::SpawnedTestServer https_server_expired_; |
- net::SpawnedTestServer https_server_mismatched_; |
+ net::EmbeddedTestServer https_server_; |
+ net::EmbeddedTestServer https_server_expired_; |
+ net::EmbeddedTestServer https_server_mismatched_; |
net::SpawnedTestServer wss_server_expired_; |
private: |
@@ -598,10 +593,10 @@ class SSLUITestWithExtendedReporting : public SSLUITest { |
// Visits a regular page over http. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
- ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), embedded_test_server()->GetURL("/ssl/google.html")); |
CheckUnauthenticatedState( |
browser()->tab_strip_model()->GetActiveWebContents(), AuthState::NONE); |
@@ -612,31 +607,29 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) { |
// TODO(jcampan): test that bad HTTPS content is blocked (otherwise we'll give |
// the secure cookies away!). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_with_unsafe_contents.html", |
- https_server_expired_.host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement("/ssl/page_with_unsafe_contents.html", |
+ https_server_expired_.host_port_pair(), |
+ &replacement_path); |
ui_test_utils::NavigateToURL( |
- browser(), test_server()->GetURL(replacement_path)); |
+ browser(), embedded_test_server()->GetURL(replacement_path)); |
CheckUnauthenticatedState( |
browser()->tab_strip_model()->GetActiveWebContents(), AuthState::NONE); |
} |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestBrokenHTTPSWithInsecureContent) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_displays_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_displays_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
ui_test_utils::NavigateToURL(browser(), |
https_server_expired_.GetURL(replacement_path)); |
@@ -742,7 +735,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestOKHTTPS) { |
ASSERT_TRUE(https_server_.Start()); |
ui_test_utils::NavigateToURL(browser(), |
- https_server_.GetURL("files/ssl/google.html")); |
+ https_server_.GetURL("/ssl/google.html")); |
CheckAuthenticatedState(browser()->tab_strip_model()->GetActiveWebContents(), |
AuthState::NONE); |
@@ -759,8 +752,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestOKHTTPS) { |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndProceed) { |
ASSERT_TRUE(https_server_expired_.Start()); |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState( |
@@ -784,20 +777,19 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndProceed) { |
// Visits a page with https error and don't proceed (and ensure we can still |
// navigate at that point): |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndDontProceed) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
// First navigate to an OK page. |
ui_test_utils::NavigateToURL(browser(), |
- https_server_.GetURL("files/ssl/google.html")); |
+ https_server_.GetURL("/ssl/google.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry); |
- GURL cross_site_url = |
- https_server_expired_.GetURL("files/ssl/google.html"); |
+ GURL cross_site_url = https_server_expired_.GetURL("/ssl/google.html"); |
// Change the host name from 127.0.0.1 to localhost so it triggers a |
// cross-site navigation so we can test http://crbug.com/5800 is gone. |
ASSERT_EQ("127.0.0.1", cross_site_url.host()); |
@@ -824,8 +816,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndDontProceed) { |
CheckAuthenticatedState(tab, AuthState::NONE); |
// Try to navigate to a new page. (to make sure bug 5800 is fixed). |
- ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), embedded_test_server()->GetURL("/ssl/google.html")); |
CheckUnauthenticatedState(tab, AuthState::NONE); |
} |
@@ -837,7 +829,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreLocalhostCertErrors, |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
// Navigate to a localhost page. |
- GURL url = https_server_.GetURL("files/ssl/page_with_subresource.html"); |
+ GURL url = https_server_.GetURL("/ssl/page_with_subresource.html"); |
GURL::Replacements replacements; |
std::string new_host("localhost"); |
replacements.SetHostStr(new_host); |
@@ -881,19 +873,19 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSErrorCausedByClock) { |
// Visits a page with https error and then goes back using Browser::GoBack. |
IN_PROC_BROWSER_TEST_F(SSLUITest, |
TestHTTPSExpiredCertAndGoBackViaButton) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
// First navigate to an HTTP page. |
- ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), embedded_test_server()->GetURL("/ssl/google.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry); |
// Now go to a bad HTTPS page that shows an interstitial. |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::SHOWING_INTERSTITIAL); |
@@ -920,19 +912,19 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
// Disabled because its flaky: http://crbug.com/40932, http://crbug.com/43575. |
IN_PROC_BROWSER_TEST_F(SSLUITest, |
TestHTTPSExpiredCertAndGoBackViaMenu) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
// First navigate to an HTTP page. |
- ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), embedded_test_server()->GetURL("/ssl/google.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry); |
// Now go to a bad HTTPS page that shows an interstitial. |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::SHOWING_INTERSTITIAL); |
@@ -947,17 +939,17 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
// Visits a page with https error and then goes forward using GoToOffset. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
// First navigate to two HTTP pages. |
- ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), embedded_test_server()->GetURL("/ssl/google.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry1 = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry1); |
- ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/ssl/blank_page.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), embedded_test_server()->GetURL("/ssl/blank_page.html")); |
NavigationEntry* entry2 = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry2); |
@@ -974,8 +966,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) { |
ASSERT_TRUE(entry1 == entry3); |
// Now go to a bad HTTPS page that shows an interstitial. |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::SHOWING_INTERSTITIAL); |
@@ -1007,7 +999,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) { |
#define MAYBE_TestWSSInvalidCertAndClose TestWSSInvalidCertAndClose |
#endif |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestWSSInvalidCertAndClose) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(wss_server_expired_.Start()); |
// Setup page title observer. |
@@ -1016,13 +1008,17 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestWSSInvalidCertAndClose) { |
watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL")); |
// Create GURLs to test pages. |
- std::string master_url_path = base::StringPrintf("%s?%d", |
- test_server()->GetURL("files/ssl/wss_close.html").spec().c_str(), |
+ std::string master_url_path = base::StringPrintf( |
+ "%s?%d", |
+ embedded_test_server()->GetURL("/ssl/wss_close.html").spec().c_str(), |
wss_server_expired_.host_port_pair().port()); |
GURL master_url(master_url_path); |
- std::string slave_url_path = base::StringPrintf("%s?%d", |
- test_server()->GetURL("files/ssl/wss_close_slave.html").spec().c_str(), |
- wss_server_expired_.host_port_pair().port()); |
+ std::string slave_url_path = |
+ base::StringPrintf("%s?%d", embedded_test_server() |
+ ->GetURL("/ssl/wss_close_slave.html") |
+ .spec() |
+ .c_str(), |
+ wss_server_expired_.host_port_pair().port()); |
GURL slave_url(slave_url_path); |
// Create tabs and visit pages which keep on creating wss connections. |
@@ -1049,7 +1045,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestWSSInvalidCertAndClose) { |
// requests WSS connection to the same origin host to check if WSS connection |
// share certificates policy with HTTPS correcly. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestWSSInvalidCertAndGoForward) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(wss_server_expired_.Start()); |
// Setup page title observer. |
@@ -1060,10 +1056,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestWSSInvalidCertAndGoForward) { |
// Visit bad HTTPS page. |
GURL::Replacements replacements; |
replacements.SetSchemeStr("https"); |
- ui_test_utils::NavigateToURL( |
- browser(), |
- wss_server_expired_.GetURL( |
- "connect_check.html").ReplaceComponents(replacements)); |
+ ui_test_utils::NavigateToURL(browser(), |
+ wss_server_expired_.GetURL("connect_check.html") |
+ .ReplaceComponents(replacements)); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::SHOWING_INTERSTITIAL); |
@@ -1161,8 +1156,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITestWithClientCert, TestWSSClientCert) { |
ASSERT_TRUE(wss_server.Start()); |
GURL::Replacements replacements; |
replacements.SetSchemeStr("https"); |
- GURL url = wss_server.GetURL("connect_check.html").ReplaceComponents( |
- replacements); |
+ GURL url = |
+ wss_server.GetURL("connect_check.html").ReplaceComponents(replacements); |
// Setup page title observer. |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -1208,7 +1203,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITestWithClientCert, TestWSSClientCert) { |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSErrorWithNoNavEntry) { |
ASSERT_TRUE(https_server_expired_.Start()); |
- GURL url = https_server_expired_.GetURL("files/ssl/google.htm"); |
+ GURL url = https_server_expired_.GetURL("/ssl/google.htm"); |
WebContents* tab2 = chrome::AddSelectedTabWithURL( |
browser(), url, ui::PAGE_TRANSITION_TYPED); |
content::WaitForLoadStop(tab2); |
@@ -1224,11 +1219,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSErrorWithNoNavEntry) { |
} |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadHTTPSDownload) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
- GURL url_non_dangerous = test_server()->GetURL(std::string()); |
+ GURL url_non_dangerous = embedded_test_server()->GetURL("/"); |
GURL url_dangerous = |
- https_server_expired_.GetURL("files/downloads/dangerous/dangerous.exe"); |
+ https_server_expired_.GetURL("/downloads/dangerous/dangerous.exe"); |
base::ScopedTempDir downloads_directory_; |
// Need empty temp dir to avoid having Chrome ask us for a new filename |
@@ -1303,14 +1298,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadHTTPSDownload) { |
// Visits a page that displays insecure content. |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestDisplaysInsecureContent) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_displays_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_displays_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
// Load a page that displays insecure content. |
ui_test_utils::NavigateToURL(browser(), |
@@ -1424,11 +1418,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting, |
// Based on http://crbug.com/8706 |
IN_PROC_BROWSER_TEST_F(SSLUITest, |
TestRunsInsecuredContentRandomizeHash) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
- ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( |
- "files/ssl/page_runs_insecure_content.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_.GetURL("/ssl/page_runs_insecure_content.html")); |
CheckAuthenticationBrokenState( |
browser()->tab_strip_model()->GetActiveWebContents(), CertError::NONE, |
@@ -1443,10 +1437,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) { |
ASSERT_TRUE(https_server_expired_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_with_unsafe_contents.html", |
- https_server_expired_.host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement("/ssl/page_with_unsafe_contents.html", |
+ https_server_expired_.host_port_pair(), |
+ &replacement_path); |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
@@ -1492,14 +1485,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) { |
#endif |
IN_PROC_BROWSER_TEST_F(SSLUITest, |
MAYBE_TestDisplaysInsecureContentLoadedFromJS) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_with_dynamic_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_with_dynamic_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( |
replacement_path)); |
@@ -1522,11 +1514,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
// one that doesn't. The test checks that we do not propagate the insecure |
// content state from one to the other. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentTwoTabs) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
ui_test_utils::NavigateToURL(browser(), |
- https_server_.GetURL("files/ssl/blank_page.html")); |
+ https_server_.GetURL("/ssl/blank_page.html")); |
WebContents* tab1 = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -1535,10 +1527,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentTwoTabs) { |
// Create a new tab. |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_displays_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_displays_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
GURL url = https_server_.GetURL(replacement_path); |
chrome::NavigateParams params(browser(), url, ui::PAGE_TRANSITION_TYPED); |
@@ -1563,11 +1554,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentTwoTabs) { |
// that doesn't. The test checks that we propagate the insecure content state |
// from one to the other. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
ui_test_utils::NavigateToURL(browser(), |
- https_server_.GetURL("files/ssl/blank_page.html")); |
+ https_server_.GetURL("/ssl/blank_page.html")); |
WebContents* tab1 = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -1575,10 +1566,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) { |
CheckAuthenticatedState(tab1, AuthState::NONE); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_runs_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_runs_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
// Create a new tab in the same process. Using a NEW_FOREGROUND_TAB |
// disposition won't usually stay in the same process, but this works |
@@ -1611,17 +1601,16 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) { |
// referencing that same image over http (hoping it is coming from the webcore |
// memory cache). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_displays_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_displays_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
// Load original page over HTTP. |
- const GURL url_http = test_server()->GetURL(replacement_path); |
+ const GURL url_http = embedded_test_server()->GetURL(replacement_path); |
ui_test_utils::NavigateToURL(browser(), url_http); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckUnauthenticatedState(tab, AuthState::NONE); |
@@ -1645,17 +1634,16 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) { |
// referencing that same script over http (hoping it is coming from the webcore |
// memory cache). |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestRunsCachedInsecureContent) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_runs_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_runs_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
// Load original page over HTTP. |
- const GURL url_http = test_server()->GetURL(replacement_path); |
+ const GURL url_http = embedded_test_server()->GetURL(replacement_path); |
ui_test_utils::NavigateToURL(browser(), url_http); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckUnauthenticatedState(tab, AuthState::NONE); |
@@ -1677,8 +1665,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCNInvalidStickiness) { |
// First we hit the server with hostname, this generates an invalid policy |
// error. |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_mismatched_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_mismatched_.GetURL("/ssl/google.html")); |
// We get an interstitial page as a result. |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -1690,15 +1678,15 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCNInvalidStickiness) { |
tab, net::CERT_STATUS_COMMON_NAME_INVALID, AuthState::NONE); |
// Now we try again with the right host name this time. |
- GURL url(https_server_.GetURL("files/ssl/google.html")); |
+ GURL url(https_server_.GetURL("/ssl/google.html")); |
ui_test_utils::NavigateToURL(browser(), url); |
// Security state should be OK. |
CheckAuthenticatedState(tab, AuthState::NONE); |
// Now try again the broken one to make sure it is still broken. |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_mismatched_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_mismatched_.GetURL("/ssl/google.html")); |
// Since we OKed the interstitial last time, we get right to the page. |
CheckAuthenticationBrokenState( |
@@ -1717,8 +1705,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCNInvalidStickiness) { |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) { |
ASSERT_TRUE(https_server_expired_.Start()); |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/page_with_refs.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/page_with_refs.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState( |
@@ -1730,8 +1718,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) { |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::NONE); |
// Now navigate to a ref in the page, the security state should not have |
// changed. |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/page_with_refs.html#jp")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/page_with_refs.html#jp")); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::NONE); |
@@ -1742,17 +1730,16 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) { |
// TODO(jcampan): http://crbug.com/2136 disabled because the popup is not |
// opened as it is not initiated by a user gesture. |
IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_with_unsafe_popup.html", |
- https_server_expired_.host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement("/ssl/page_with_unsafe_popup.html", |
+ https_server_expired_.host_port_pair(), |
+ &replacement_path); |
- ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL(replacement_path)); |
+ ui_test_utils::NavigateToURL( |
+ browser(), embedded_test_server()->GetURL(replacement_path)); |
WebContents* tab1 = browser()->tab_strip_model()->GetActiveWebContents(); |
// It is probably overkill to add a notification for a popup-opening, let's |
@@ -1769,7 +1756,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) { |
// Let's add another tab to make sure the browser does not exit when we close |
// the first tab. |
- GURL url = test_server()->GetURL("files/ssl/google.html"); |
+ GURL url = embedded_test_server()->GetURL("/ssl/google.html"); |
content::WindowedNotificationObserver observer( |
content::NOTIFICATION_LOAD_STOP, |
content::NotificationService::AllSources()); |
@@ -1785,8 +1772,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectBadToGoodHTTPS) { |
ASSERT_TRUE(https_server_.Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
- GURL url1 = https_server_expired_.GetURL("server-redirect?"); |
- GURL url2 = https_server_.GetURL("files/ssl/google.html"); |
+ GURL url1 = https_server_expired_.GetURL("/server-redirect?"); |
+ GURL url2 = https_server_.GetURL("/ssl/google.html"); |
ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec())); |
@@ -1813,8 +1800,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestRedirectGoodToBadHTTPS) { |
ASSERT_TRUE(https_server_.Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
- GURL url1 = https_server_.GetURL("server-redirect?"); |
- GURL url2 = https_server_expired_.GetURL("files/ssl/google.html"); |
+ GURL url1 = https_server_.GetURL("/server-redirect?"); |
+ GURL url2 = https_server_expired_.GetURL("/ssl/google.html"); |
ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec())); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -1829,15 +1816,14 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestRedirectGoodToBadHTTPS) { |
// Visit a page over http that is a redirect to a page with good HTTPS. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
// HTTP redirects to good HTTPS. |
- GURL http_url = test_server()->GetURL("server-redirect?"); |
- GURL good_https_url = |
- https_server_.GetURL("files/ssl/google.html"); |
+ GURL http_url = embedded_test_server()->GetURL("/server-redirect?"); |
+ GURL good_https_url = https_server_.GetURL("/ssl/google.html"); |
ui_test_utils::NavigateToURL(browser(), |
GURL(http_url.spec() + good_https_url.spec())); |
@@ -1853,14 +1839,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) { |
// Visit a page over http that is a redirect to a page with bad HTTPS. |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestRedirectHTTPToBadHTTPS) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
- GURL http_url = test_server()->GetURL("server-redirect?"); |
- GURL bad_https_url = |
- https_server_expired_.GetURL("files/ssl/google.html"); |
+ GURL http_url = embedded_test_server()->GetURL("/server-redirect?"); |
+ GURL bad_https_url = https_server_expired_.GetURL("/ssl/google.html"); |
ui_test_utils::NavigateToURL(browser(), |
GURL(http_url.spec() + bad_https_url.spec())); |
CheckAuthenticationBrokenState( |
@@ -1875,11 +1860,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestRedirectHTTPToBadHTTPS) { |
// Visit a page over https that is a redirect to a page with http (to make sure |
// we don't keep the secure state). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
- GURL https_url = https_server_.GetURL("server-redirect?"); |
- GURL http_url = test_server()->GetURL("files/ssl/google.html"); |
+ GURL https_url = https_server_.GetURL("/server-redirect?"); |
+ GURL http_url = embedded_test_server()->GetURL("/ssl/google.html"); |
ui_test_utils::NavigateToURL(browser(), |
GURL(https_url.spec() + http_url.spec())); |
@@ -1912,15 +1897,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestConnectToBadPort) { |
// back |
// - navigate to HTTP (expect insecure content), then back |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
std::string top_frame_path; |
- ASSERT_TRUE(GetTopFramePath(*test_server(), |
- https_server_, |
- https_server_expired_, |
- &top_frame_path)); |
+ GetTopFramePath(*embedded_test_server(), https_server_, https_server_expired_, |
+ &top_frame_path); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
ui_test_utils::NavigateToURL(browser(), |
@@ -2019,14 +2002,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) { |
// From a bad HTTPS top frame: |
// - navigate to an OK HTTPS frame (expected to be still authentication broken). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) { |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
std::string top_frame_path; |
- ASSERT_TRUE(GetTopFramePath(*test_server(), |
- https_server_, |
- https_server_expired_, |
- &top_frame_path)); |
+ GetTopFramePath(*embedded_test_server(), https_server_, https_server_expired_, |
+ &top_frame_path); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
ui_test_utils::NavigateToURL(browser(), |
@@ -2057,19 +2039,17 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) { |
// stay unauthenticated). |
// Disabled, flakily exceeds test timeout, http://crbug.com/43437. |
IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnauthenticatedFrameNavigation) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
std::string top_frame_path; |
- ASSERT_TRUE(GetTopFramePath(*test_server(), |
- https_server_, |
- https_server_expired_, |
- &top_frame_path)); |
+ GetTopFramePath(*embedded_test_server(), https_server_, https_server_expired_, |
+ &top_frame_path); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL(top_frame_path)); |
+ embedded_test_server()->GetURL(top_frame_path)); |
CheckUnauthenticatedState(tab, AuthState::NONE); |
// Now navigate inside the frame to a secure HTTPS frame. |
@@ -2125,8 +2105,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerFiltered) { |
// This page will spawn a Worker which will try to load content from |
// BadCertServer. |
std::string page_with_unsafe_worker_path; |
- ASSERT_TRUE(GetPageWithUnsafeWorkerPath(https_server_expired_, |
- &page_with_unsafe_worker_path)); |
+ GetPageWithUnsafeWorkerPath(https_server_expired_, |
+ &page_with_unsafe_worker_path); |
ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( |
page_with_unsafe_worker_path)); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -2154,7 +2134,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerWithUserException) { |
// Navigate to an unsafe site. Proceed with interstitial page to indicate |
// the user approves the bad certificate. |
ui_test_utils::NavigateToURL( |
- browser(), https_server_mismatched_.GetURL("files/ssl/blank_page.html")); |
+ browser(), https_server_mismatched_.GetURL("/ssl/blank_page.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_COMMON_NAME_INVALID, |
AuthState::SHOWING_INTERSTITIAL); |
@@ -2166,8 +2146,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerWithUserException) { |
// Expect content to load but be marked as auth broken due to running insecure |
// content. |
std::string page_with_unsafe_worker_path; |
- ASSERT_TRUE(GetPageWithUnsafeWorkerPath(https_server_mismatched_, |
- &page_with_unsafe_worker_path)); |
+ GetPageWithUnsafeWorkerPath(https_server_mismatched_, |
+ &page_with_unsafe_worker_path); |
ui_test_utils::NavigateToURL( |
browser(), https_server_.GetURL(page_with_unsafe_worker_path)); |
CheckWorkerLoadResult(tab, true); // Worker loads insecure content |
@@ -2191,7 +2171,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsWithUserException) { |
// Navigate to an unsafe site. Proceed with interstitial page to indicate |
// the user approves the bad certificate. |
ui_test_utils::NavigateToURL( |
- browser(), https_server_mismatched_.GetURL("files/ssl/blank_page.html")); |
+ browser(), https_server_mismatched_.GetURL("/ssl/blank_page.html")); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_COMMON_NAME_INVALID, |
AuthState::SHOWING_INTERSTITIAL); |
@@ -2200,9 +2180,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsWithUserException) { |
AuthState::NONE); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_with_unsafe_contents.html", |
- https_server_mismatched_.host_port_pair(), &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_with_unsafe_contents.html", |
+ https_server_mismatched_.host_port_pair(), &replacement_path); |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
@@ -2229,14 +2209,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsWithUserException) { |
// indicator shows a secure page, because the blocking made the otherwise |
// unsafe page safe (the notification of this state is handled by other means). |
IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureImage) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_displays_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_displays_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
@@ -2249,14 +2228,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureImage) { |
// indicator shows a secure page, because the blocking made the otherwise |
// unsafe page safe (the notification of this state is handled by other means) |
IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureIframe) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_displays_insecure_iframe.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_displays_insecure_iframe.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
@@ -2269,14 +2247,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureIframe) { |
// indicator shows a secure page, because the blocking made the otherwise |
// unsafe page safe (the notification of this state is handled by other means). |
IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockRunningInsecureContent) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_runs_insecure_content.html", |
- test_server()->host_port_pair(), |
- &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_runs_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
@@ -2289,7 +2266,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockRunningInsecureContent) { |
// --ignore-certificate-errors. The connection should be established without |
// interstitial page showing. |
IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreCertErrors, TestWSS) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
ASSERT_TRUE(wss_server_expired_.Start()); |
// Setup page title observer. |
@@ -2300,10 +2277,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreCertErrors, TestWSS) { |
// Visit bad HTTPS page. |
GURL::Replacements replacements; |
replacements.SetSchemeStr("https"); |
- ui_test_utils::NavigateToURL( |
- browser(), |
- wss_server_expired_.GetURL( |
- "connect_check.html").ReplaceComponents(replacements)); |
+ ui_test_utils::NavigateToURL(browser(), |
+ wss_server_expired_.GetURL("connect_check.html") |
+ .ReplaceComponents(replacements)); |
// We shouldn't have an interstitial page showing here. |
@@ -2330,8 +2306,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestInterstitialJavaScriptProceeds) { |
ASSERT_TRUE(https_server_expired_.Start()); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::SHOWING_INTERSTITIAL); |
@@ -2365,8 +2341,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestInterstitialJavaScriptGoesBack) { |
ASSERT_TRUE(https_server_expired_.Start()); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
- ui_test_utils::NavigateToURL(browser(), |
- https_server_expired_.GetURL("files/ssl/google.html")); |
+ ui_test_utils::NavigateToURL( |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::SHOWING_INTERSTITIAL); |
@@ -2395,16 +2371,17 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestInterstitialJavaScriptGoesBack) { |
// https://crbug.com/381439 |
IN_PROC_BROWSER_TEST_F(SSLUITest, InterstitialNotAffectedByHideShow) { |
ASSERT_TRUE(https_server_expired_.Start()); |
+ ASSERT_TRUE(https_server_.Start()); |
+ |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
EXPECT_TRUE(tab->GetRenderWidgetHostView()->IsShowing()); |
ui_test_utils::NavigateToURL( |
- browser(), https_server_expired_.GetURL("files/ssl/google.html")); |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
CheckAuthenticationBrokenState( |
tab, net::CERT_STATUS_DATE_INVALID, AuthState::SHOWING_INTERSTITIAL); |
EXPECT_TRUE(tab->GetRenderWidgetHostView()->IsShowing()); |
- AddTabAtIndex(0, |
- https_server_.GetURL("files/ssl/google.html"), |
+ AddTabAtIndex(0, https_server_.GetURL("/ssl/google.html"), |
ui::PAGE_TRANSITION_TYPED); |
EXPECT_EQ(2, browser()->tab_strip_model()->count()); |
EXPECT_EQ(0, browser()->tab_strip_model()->active_index()); |
@@ -2427,9 +2404,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, BadCertFollowedByGoodCert) { |
ASSERT_TRUE(https_server_.Start()); |
std::string https_server_expired_host = |
- https_server_.GetURL("files/ssl/google.html").host(); |
+ https_server_.GetURL("/ssl/google.html").host(); |
std::string https_server_host = |
- https_server_.GetURL("files/ssl/google.html").host(); |
+ https_server_.GetURL("/ssl/google.html").host(); |
ASSERT_EQ(https_server_expired_host, https_server_host); |
WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -2440,13 +2417,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, BadCertFollowedByGoodCert) { |
profile->GetSSLHostStateDelegate()); |
ui_test_utils::NavigateToURL( |
- browser(), https_server_expired_.GetURL("files/ssl/google.html")); |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
ProceedThroughInterstitial(tab); |
EXPECT_TRUE(state->HasAllowException(https_server_host)); |
ui_test_utils::NavigateToURL(browser(), |
- https_server_.GetURL("files/ssl/google.html")); |
+ https_server_.GetURL("/ssl/google.html")); |
ASSERT_FALSE(tab->GetInterstitialPage()); |
EXPECT_FALSE(state->HasAllowException(https_server_host)); |
} |
@@ -2461,7 +2438,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
ASSERT_TRUE(tab); |
ui_test_utils::NavigateToURL( |
- browser(), https_server_expired_.GetURL("files/ssl/google.html")); |
+ browser(), https_server_expired_.GetURL("/ssl/google.html")); |
content::WaitForInterstitialAttach(tab); |
EXPECT_TRUE(tab->ShowingInterstitialPage()); |
@@ -2546,10 +2523,9 @@ class CommonNameMismatchBrowserTest : public CertVerifierBrowserTest { |
// mail.example.com. |
IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
ShouldShowWWWSubdomainMismatchInterstitial) { |
- net::SpawnedTestServer https_server_example_domain_( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_OK), |
+ net::EmbeddedTestServer https_server_example_domain_( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_server_example_domain_.ServeFilesFromSourceDirectory( |
base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_server_example_domain_.Start()); |
@@ -2585,7 +2561,7 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
// Use a complex URL to ensure the path, etc., are preserved. The path itself |
// does not matter. |
GURL https_server_url = |
- https_server_example_domain_.GetURL("files/ssl/google.html?a=b#anchor"); |
+ https_server_example_domain_.GetURL("/ssl/google.html?a=b#anchor"); |
GURL::Replacements replacements; |
replacements.SetHostStr("www.mail.example.com"); |
GURL https_server_mismatched_url = |
@@ -2609,10 +2585,9 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
// for www.example.org. Verify that the page redirects to www.example.org. |
IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
CheckWWWSubdomainMismatchInverse) { |
- net::SpawnedTestServer https_server_example_domain_( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_OK), |
+ net::EmbeddedTestServer https_server_example_domain_( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_server_example_domain_.ServeFilesFromSourceDirectory( |
base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_server_example_domain_.Start()); |
@@ -2640,7 +2615,7 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
verify_result_valid, net::OK); |
GURL https_server_url = |
- https_server_example_domain_.GetURL("files/ssl/google.html?a=b"); |
+ https_server_example_domain_.GetURL("/ssl/google.html?a=b"); |
GURL::Replacements replacements; |
replacements.SetHostStr("example.org"); |
GURL https_server_mismatched_url = |
@@ -2665,10 +2640,9 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
// - Stopping the page load shouldn't result in any interstitials. |
IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
InterstitialStopNavigationWhileLoading) { |
- net::SpawnedTestServer https_server_example_domain_( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_OK), |
+ net::EmbeddedTestServer https_server_example_domain_( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_server_example_domain_.ServeFilesFromSourceDirectory( |
base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_server_example_domain_.Start()); |
@@ -2697,7 +2671,7 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
verify_result_valid, net::OK); |
GURL https_server_url = |
- https_server_example_domain_.GetURL("files/ssl/google.html?a=b"); |
+ https_server_example_domain_.GetURL("/ssl/google.html?a=b"); |
GURL::Replacements replacements; |
replacements.SetHostStr("www.mail.example.com"); |
GURL https_server_mismatched_url = |
@@ -2734,10 +2708,9 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
// result is the same. (i.e. page load stops, no interstitials shown) |
IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
InterstitialReloadNavigationWhileLoading) { |
- net::SpawnedTestServer https_server_example_domain_( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_OK), |
+ net::EmbeddedTestServer https_server_example_domain_( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_server_example_domain_.ServeFilesFromSourceDirectory( |
base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_server_example_domain_.Start()); |
@@ -2766,7 +2739,7 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
verify_result_valid, net::OK); |
GURL https_server_url = |
- https_server_example_domain_.GetURL("files/ssl/google.html?a=b"); |
+ https_server_example_domain_.GetURL("/ssl/google.html?a=b"); |
GURL::Replacements replacements; |
replacements.SetHostStr("www.mail.example.com"); |
GURL https_server_mismatched_url = |
@@ -2801,10 +2774,9 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
// new page should load, and no interstitials should be shown. |
IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
InterstitialNavigateAwayWhileLoading) { |
- net::SpawnedTestServer https_server_example_domain_( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_OK), |
+ net::EmbeddedTestServer https_server_example_domain_( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_server_example_domain_.ServeFilesFromSourceDirectory( |
base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_server_example_domain_.Start()); |
@@ -2833,7 +2805,7 @@ IN_PROC_BROWSER_TEST_F(CommonNameMismatchBrowserTest, |
verify_result_valid, net::OK); |
GURL https_server_url = |
- https_server_example_domain_.GetURL("files/ssl/google.html?a=b"); |
+ https_server_example_domain_.GetURL("/ssl/google.html?a=b"); |
GURL::Replacements replacements; |
replacements.SetHostStr("www.mail.example.com"); |
GURL https_server_mismatched_url = |
@@ -2886,18 +2858,15 @@ IN_PROC_BROWSER_TEST_F(SSLBlockingPageIDNTest, SSLBlockingPageDecodesIDN) { |
} |
IN_PROC_BROWSER_TEST_F(CertVerifierBrowserTest, MockCertVerifierSmokeTest) { |
- net::SpawnedTestServer https_server( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_OK), |
- base::FilePath(kDocRoot)); |
+ net::EmbeddedTestServer https_server(net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_server.Start()); |
mock_cert_verifier()->set_default_result( |
net::ERR_CERT_NAME_CONSTRAINT_VIOLATION); |
ui_test_utils::NavigateToURL(browser(), |
- https_server.GetURL("files/ssl/google.html")); |
+ https_server.GetURL("/ssl/google.html")); |
CheckSecurityState(browser()->tab_strip_model()->GetActiveWebContents(), |
net::CERT_STATUS_NAME_CONSTRAINT_VIOLATION, |