Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(31)

Side by Side Diff: chrome/browser/policy/policy_browsertest.cc

Issue 1391423002: net: Remove FilePath version of URLRequestMockHTTPJob::GetMockUrl(). (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: mmenke review Created 5 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <algorithm> 5 #include <algorithm>
6 #include <string> 6 #include <string>
7 #include <vector> 7 #include <vector>
8 8
9 #include "ash/display/display_manager.h" 9 #include "ash/display/display_manager.h"
10 #include "base/bind.h" 10 #include "base/bind.h"
(...skipping 360 matching lines...) Expand 10 before | Expand all | Expand 10 after
371 371
372 // Downloads a file named |file| and expects it to be saved to |dir|, which 372 // Downloads a file named |file| and expects it to be saved to |dir|, which
373 // must be empty. 373 // must be empty.
374 void DownloadAndVerifyFile( 374 void DownloadAndVerifyFile(
375 Browser* browser, const base::FilePath& dir, const base::FilePath& file) { 375 Browser* browser, const base::FilePath& dir, const base::FilePath& file) {
376 content::DownloadManager* download_manager = 376 content::DownloadManager* download_manager =
377 content::BrowserContext::GetDownloadManager(browser->profile()); 377 content::BrowserContext::GetDownloadManager(browser->profile());
378 content::DownloadTestObserverTerminal observer( 378 content::DownloadTestObserverTerminal observer(
379 download_manager, 1, 379 download_manager, 1,
380 content::DownloadTestObserver::ON_DANGEROUS_DOWNLOAD_FAIL); 380 content::DownloadTestObserver::ON_DANGEROUS_DOWNLOAD_FAIL);
381 GURL url(URLRequestMockHTTPJob::GetMockUrl(file)); 381 GURL url(URLRequestMockHTTPJob::GetMockUrl(file.MaybeAsASCII()));
382 base::FilePath downloaded = dir.Append(file); 382 base::FilePath downloaded = dir.Append(file);
383 EXPECT_FALSE(base::PathExists(downloaded)); 383 EXPECT_FALSE(base::PathExists(downloaded));
384 ui_test_utils::NavigateToURL(browser, url); 384 ui_test_utils::NavigateToURL(browser, url);
385 observer.WaitForFinished(); 385 observer.WaitForFinished();
386 EXPECT_EQ( 386 EXPECT_EQ(
387 1u, observer.NumDownloadsSeenInState(content::DownloadItem::COMPLETE)); 387 1u, observer.NumDownloadsSeenInState(content::DownloadItem::COMPLETE));
388 EXPECT_TRUE(base::PathExists(downloaded)); 388 EXPECT_TRUE(base::PathExists(downloaded));
389 base::FileEnumerator enumerator(dir, false, base::FileEnumerator::FILES); 389 base::FileEnumerator enumerator(dir, false, base::FileEnumerator::FILES);
390 EXPECT_EQ(file, enumerator.Next().BaseName()); 390 EXPECT_EQ(file, enumerator.Next().BaseName());
391 EXPECT_EQ(base::FilePath(), enumerator.Next()); 391 EXPECT_EQ(base::FilePath(), enumerator.Next());
(...skipping 1126 matching lines...) Expand 10 before | Expand all | Expand 10 after
1518 // No plugins at startup. 1518 // No plugins at startup.
1519 EXPECT_EQ(0, CountPlugins()); 1519 EXPECT_EQ(0, CountPlugins());
1520 1520
1521 content::WebContents* contents = 1521 content::WebContents* contents =
1522 browser()->tab_strip_model()->GetActiveWebContents(); 1522 browser()->tab_strip_model()->GetActiveWebContents();
1523 ASSERT_TRUE(contents); 1523 ASSERT_TRUE(contents);
1524 InfoBarService* infobar_service = InfoBarService::FromWebContents(contents); 1524 InfoBarService* infobar_service = InfoBarService::FromWebContents(contents);
1525 ASSERT_TRUE(infobar_service); 1525 ASSERT_TRUE(infobar_service);
1526 EXPECT_EQ(0u, infobar_service->infobar_count()); 1526 EXPECT_EQ(0u, infobar_service->infobar_count());
1527 1527
1528 base::FilePath path(FILE_PATH_LITERAL("plugin/quicktime.html")); 1528 GURL url(URLRequestMockHTTPJob::GetMockUrl("plugin/quicktime.html"));
1529 GURL url(URLRequestMockHTTPJob::GetMockUrl(path));
1530 ui_test_utils::NavigateToURL(browser(), url); 1529 ui_test_utils::NavigateToURL(browser(), url);
1531 // This should have triggered the dangerous plugin infobar. 1530 // This should have triggered the dangerous plugin infobar.
1532 ASSERT_EQ(1u, infobar_service->infobar_count()); 1531 ASSERT_EQ(1u, infobar_service->infobar_count());
1533 EXPECT_TRUE( 1532 EXPECT_TRUE(
1534 infobar_service->infobar_at(0)->delegate()->AsConfirmInfoBarDelegate()); 1533 infobar_service->infobar_at(0)->delegate()->AsConfirmInfoBarDelegate());
1535 // And the plugin isn't running. 1534 // And the plugin isn't running.
1536 EXPECT_EQ(0, CountPlugins()); 1535 EXPECT_EQ(0, CountPlugins());
1537 1536
1538 // Now set a policy to always authorize this. 1537 // Now set a policy to always authorize this.
1539 PolicyMap policies; 1538 PolicyMap policies;
(...skipping 188 matching lines...) Expand 10 before | Expand all | Expand 10 after
1728 // Verify that the extensions are not installed initially. 1727 // Verify that the extensions are not installed initially.
1729 ExtensionService* service = extension_service(); 1728 ExtensionService* service = extension_service();
1730 ASSERT_FALSE(service->GetExtensionById(kImporterId, true)); 1729 ASSERT_FALSE(service->GetExtensionById(kImporterId, true));
1731 ASSERT_FALSE(service->GetExtensionById(kSharedModuleId, true)); 1730 ASSERT_FALSE(service->GetExtensionById(kSharedModuleId, true));
1732 1731
1733 // Mock the webstore update URL. This is where the shared module extension 1732 // Mock the webstore update URL. This is where the shared module extension
1734 // will be installed from. 1733 // will be installed from.
1735 base::FilePath update_xml_path = base::FilePath(kTestExtensionsDir) 1734 base::FilePath update_xml_path = base::FilePath(kTestExtensionsDir)
1736 .AppendASCII("policy_shared_module") 1735 .AppendASCII("policy_shared_module")
1737 .AppendASCII("update.xml"); 1736 .AppendASCII("update.xml");
1738 GURL update_xml_url(URLRequestMockHTTPJob::GetMockUrl(update_xml_path)); 1737 GURL update_xml_url(
1738 URLRequestMockHTTPJob::GetMockUrl(update_xml_path.MaybeAsASCII()));
1739 base::CommandLine::ForCurrentProcess()->AppendSwitchASCII( 1739 base::CommandLine::ForCurrentProcess()->AppendSwitchASCII(
1740 switches::kAppsGalleryUpdateURL, update_xml_url.spec()); 1740 switches::kAppsGalleryUpdateURL, update_xml_url.spec());
1741 ui_test_utils::NavigateToURL(browser(), update_xml_url); 1741 ui_test_utils::NavigateToURL(browser(), update_xml_url);
1742 1742
1743 // Blacklist "*" but force-install the importer extension. The shared module 1743 // Blacklist "*" but force-install the importer extension. The shared module
1744 // should be automatically installed too. 1744 // should be automatically installed too.
1745 base::ListValue blacklist; 1745 base::ListValue blacklist;
1746 blacklist.AppendString("*"); 1746 blacklist.AppendString("*");
1747 base::ListValue forcelist; 1747 base::ListValue forcelist;
1748 forcelist.AppendString( 1748 forcelist.AppendString(
(...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after
1822 // Verifies that extensions that are force-installed by policies are 1822 // Verifies that extensions that are force-installed by policies are
1823 // installed and can't be uninstalled. 1823 // installed and can't be uninstalled.
1824 ExtensionService* service = extension_service(); 1824 ExtensionService* service = extension_service();
1825 ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true)); 1825 ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true));
1826 1826
1827 // Extensions that are force-installed come from an update URL, which defaults 1827 // Extensions that are force-installed come from an update URL, which defaults
1828 // to the webstore. Use a mock URL for this test with an update manifest 1828 // to the webstore. Use a mock URL for this test with an update manifest
1829 // that includes "good_v1.crx". 1829 // that includes "good_v1.crx".
1830 base::FilePath path = 1830 base::FilePath path =
1831 base::FilePath(kTestExtensionsDir).Append(kGoodV1CrxManifestName); 1831 base::FilePath(kTestExtensionsDir).Append(kGoodV1CrxManifestName);
1832 GURL url(URLRequestMockHTTPJob::GetMockUrl(path)); 1832 GURL url(URLRequestMockHTTPJob::GetMockUrl(path.MaybeAsASCII()));
1833 1833
1834 // Setting the forcelist extension should install "good_v1.crx". 1834 // Setting the forcelist extension should install "good_v1.crx".
1835 base::ListValue forcelist; 1835 base::ListValue forcelist;
1836 forcelist.Append(new base::StringValue( 1836 forcelist.Append(new base::StringValue(
1837 base::StringPrintf("%s;%s", kGoodCrxId, url.spec().c_str()))); 1837 base::StringPrintf("%s;%s", kGoodCrxId, url.spec().c_str())));
1838 PolicyMap policies; 1838 PolicyMap policies;
1839 policies.Set(key::kExtensionInstallForcelist, POLICY_LEVEL_MANDATORY, 1839 policies.Set(key::kExtensionInstallForcelist, POLICY_LEVEL_MANDATORY,
1840 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, forcelist.DeepCopy(), 1840 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, forcelist.DeepCopy(),
1841 nullptr); 1841 nullptr);
1842 extensions::TestExtensionRegistryObserver observer( 1842 extensions::TestExtensionRegistryObserver observer(
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after
1934 } 1934 }
1935 1935
1936 IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionRecommendedInstallationMode) { 1936 IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionRecommendedInstallationMode) {
1937 // Verifies that extensions that are recommended-installed by policies are 1937 // Verifies that extensions that are recommended-installed by policies are
1938 // installed, can be disabled but not uninstalled. 1938 // installed, can be disabled but not uninstalled.
1939 ExtensionService* service = extension_service(); 1939 ExtensionService* service = extension_service();
1940 ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true)); 1940 ASSERT_FALSE(service->GetExtensionById(kGoodCrxId, true));
1941 1941
1942 base::FilePath path = 1942 base::FilePath path =
1943 base::FilePath(kTestExtensionsDir).Append(kGoodV1CrxManifestName); 1943 base::FilePath(kTestExtensionsDir).Append(kGoodV1CrxManifestName);
1944 GURL url(URLRequestMockHTTPJob::GetMockUrl(path)); 1944 GURL url(URLRequestMockHTTPJob::GetMockUrl(path.MaybeAsASCII()));
1945 1945
1946 // Setting the forcelist extension should install "good_v1.crx". 1946 // Setting the forcelist extension should install "good_v1.crx".
1947 base::DictionaryValue dict_value; 1947 base::DictionaryValue dict_value;
1948 dict_value.SetString(std::string(kGoodCrxId) + "." + 1948 dict_value.SetString(std::string(kGoodCrxId) + "." +
1949 extensions::schema_constants::kInstallationMode, 1949 extensions::schema_constants::kInstallationMode,
1950 extensions::schema_constants::kNormalInstalled); 1950 extensions::schema_constants::kNormalInstalled);
1951 dict_value.SetString( 1951 dict_value.SetString(
1952 std::string(kGoodCrxId) + "." + extensions::schema_constants::kUpdateUrl, 1952 std::string(kGoodCrxId) + "." + extensions::schema_constants::kUpdateUrl,
1953 url.spec()); 1953 url.spec());
1954 PolicyMap policies; 1954 PolicyMap policies;
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after
2012 // Flaky on windows; http://crbug.com/295729 . 2012 // Flaky on windows; http://crbug.com/295729 .
2013 #if defined(OS_WIN) 2013 #if defined(OS_WIN)
2014 #define MAYBE_ExtensionInstallSources DISABLED_ExtensionInstallSources 2014 #define MAYBE_ExtensionInstallSources DISABLED_ExtensionInstallSources
2015 #else 2015 #else
2016 #define MAYBE_ExtensionInstallSources ExtensionInstallSources 2016 #define MAYBE_ExtensionInstallSources ExtensionInstallSources
2017 #endif 2017 #endif
2018 IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_ExtensionInstallSources) { 2018 IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_ExtensionInstallSources) {
2019 extensions::ScopedTestDialogAutoConfirm auto_confirm( 2019 extensions::ScopedTestDialogAutoConfirm auto_confirm(
2020 extensions::ScopedTestDialogAutoConfirm::ACCEPT); 2020 extensions::ScopedTestDialogAutoConfirm::ACCEPT);
2021 2021
2022 const GURL install_source_url(URLRequestMockHTTPJob::GetMockUrl( 2022 const GURL install_source_url(
2023 base::FilePath(FILE_PATH_LITERAL("extensions/*")))); 2023 URLRequestMockHTTPJob::GetMockUrl("extensions/*"));
2024 const GURL referrer_url(URLRequestMockHTTPJob::GetMockUrl( 2024 const GURL referrer_url(URLRequestMockHTTPJob::GetMockUrl("policy/*"));
2025 base::FilePath(FILE_PATH_LITERAL("policy/*"))));
2026 2025
2027 base::ScopedTempDir download_directory; 2026 base::ScopedTempDir download_directory;
2028 ASSERT_TRUE(download_directory.CreateUniqueTempDir()); 2027 ASSERT_TRUE(download_directory.CreateUniqueTempDir());
2029 DownloadPrefs* download_prefs = 2028 DownloadPrefs* download_prefs =
2030 DownloadPrefs::FromBrowserContext(browser()->profile()); 2029 DownloadPrefs::FromBrowserContext(browser()->profile());
2031 download_prefs->SetDownloadPath(download_directory.path()); 2030 download_prefs->SetDownloadPath(download_directory.path());
2032 2031
2033 const GURL download_page_url(URLRequestMockHTTPJob::GetMockUrl(base::FilePath( 2032 const GURL download_page_url(URLRequestMockHTTPJob::GetMockUrl(
2034 FILE_PATH_LITERAL("policy/extension_install_sources_test.html")))); 2033 "policy/extension_install_sources_test.html"));
2035 ui_test_utils::NavigateToURL(browser(), download_page_url); 2034 ui_test_utils::NavigateToURL(browser(), download_page_url);
2036 2035
2037 // As long as the policy is not present, extensions are considered dangerous. 2036 // As long as the policy is not present, extensions are considered dangerous.
2038 content::DownloadTestObserverTerminal download_observer( 2037 content::DownloadTestObserverTerminal download_observer(
2039 content::BrowserContext::GetDownloadManager(browser()->profile()), 1, 2038 content::BrowserContext::GetDownloadManager(browser()->profile()), 1,
2040 content::DownloadTestObserver::ON_DANGEROUS_DOWNLOAD_DENY); 2039 content::DownloadTestObserver::ON_DANGEROUS_DOWNLOAD_DENY);
2041 PerformClick(0, 0); 2040 PerformClick(0, 0);
2042 download_observer.WaitForFinished(); 2041 download_observer.WaitForFinished();
2043 2042
2044 // Install the policy and trigger another download. 2043 // Install the policy and trigger another download.
(...skipping 165 matching lines...) Expand 10 before | Expand all | Expand 10 after
2210 // set minimum version requirement is handled well. 2209 // set minimum version requirement is handled well.
2211 IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionMinimumVersionForceInstalled) { 2210 IN_PROC_BROWSER_TEST_F(PolicyTest, ExtensionMinimumVersionForceInstalled) {
2212 extensions::ExtensionRegistry* registry = 2211 extensions::ExtensionRegistry* registry =
2213 extensions::ExtensionRegistry::Get(browser()->profile()); 2212 extensions::ExtensionRegistry::Get(browser()->profile());
2214 extensions::ExtensionPrefs* extension_prefs = 2213 extensions::ExtensionPrefs* extension_prefs =
2215 extensions::ExtensionPrefs::Get(browser()->profile()); 2214 extensions::ExtensionPrefs::Get(browser()->profile());
2216 2215
2217 // Prepare the update URL for force installing. 2216 // Prepare the update URL for force installing.
2218 const base::FilePath path = 2217 const base::FilePath path =
2219 base::FilePath(kTestExtensionsDir).Append(kGoodV1CrxManifestName); 2218 base::FilePath(kTestExtensionsDir).Append(kGoodV1CrxManifestName);
2220 const GURL url(URLRequestMockHTTPJob::GetMockUrl(path)); 2219 const GURL url(URLRequestMockHTTPJob::GetMockUrl(path.MaybeAsASCII()));
2221 2220
2222 // Set policy to force-install the extension, it should be installed and 2221 // Set policy to force-install the extension, it should be installed and
2223 // enabled. 2222 // enabled.
2224 extensions::TestExtensionRegistryObserver install_observer( 2223 extensions::TestExtensionRegistryObserver install_observer(
2225 extensions::ExtensionRegistry::Get(browser()->profile())); 2224 extensions::ExtensionRegistry::Get(browser()->profile()));
2226 EXPECT_FALSE(registry->enabled_extensions().Contains(kGoodCrxId)); 2225 EXPECT_FALSE(registry->enabled_extensions().Contains(kGoodCrxId));
2227 { 2226 {
2228 extensions::ExtensionManagementPolicyUpdater management_policy(&provider_); 2227 extensions::ExtensionManagementPolicyUpdater management_policy(&provider_);
2229 management_policy.SetIndividualExtensionAutoInstalled(kGoodCrxId, 2228 management_policy.SetIndividualExtensionAutoInstalled(kGoodCrxId,
2230 url.spec(), true); 2229 url.spec(), true);
(...skipping 349 matching lines...) Expand 10 before | Expand all | Expand 10 after
2580 base::Bind(UndoRedirectHostsToTestData, kURLS, arraysize(kURLS)), 2579 base::Bind(UndoRedirectHostsToTestData, kURLS, arraysize(kURLS)),
2581 loop.QuitClosure()); 2580 loop.QuitClosure());
2582 loop.Run(); 2581 loop.Run();
2583 } 2582 }
2584 } 2583 }
2585 2584
2586 IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistSubresources) { 2585 IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklistSubresources) {
2587 // Checks that an image with a blacklisted URL is loaded, but an iframe with a 2586 // Checks that an image with a blacklisted URL is loaded, but an iframe with a
2588 // blacklisted URL is not. 2587 // blacklisted URL is not.
2589 2588
2590 GURL main_url = URLRequestMockHTTPJob::GetMockUrl( 2589 GURL main_url =
2591 base::FilePath(FILE_PATH_LITERAL("policy/blacklist-subresources.html"))); 2590 URLRequestMockHTTPJob::GetMockUrl("policy/blacklist-subresources.html");
2592 GURL image_url = URLRequestMockHTTPJob::GetMockUrl( 2591 GURL image_url = URLRequestMockHTTPJob::GetMockUrl("policy/pixel.png");
2593 base::FilePath(FILE_PATH_LITERAL("policy/pixel.png"))); 2592 GURL subframe_url = URLRequestMockHTTPJob::GetMockUrl("policy/blank.html");
2594 GURL subframe_url = URLRequestMockHTTPJob::GetMockUrl(
2595 base::FilePath(FILE_PATH_LITERAL("policy/blank.html")));
2596 2593
2597 // Set a blacklist containing the image and the iframe which are used by the 2594 // Set a blacklist containing the image and the iframe which are used by the
2598 // main document. 2595 // main document.
2599 base::ListValue blacklist; 2596 base::ListValue blacklist;
2600 blacklist.Append(new base::StringValue(image_url.spec().c_str())); 2597 blacklist.Append(new base::StringValue(image_url.spec().c_str()));
2601 blacklist.Append(new base::StringValue(subframe_url.spec().c_str())); 2598 blacklist.Append(new base::StringValue(subframe_url.spec().c_str()));
2602 PolicyMap policies; 2599 PolicyMap policies;
2603 policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY, 2600 policies.Set(key::kURLBlacklist, POLICY_LEVEL_MANDATORY,
2604 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, blacklist.DeepCopy(), 2601 POLICY_SCOPE_USER, POLICY_SOURCE_CLOUD, blacklist.DeepCopy(),
2605 nullptr); 2602 nullptr);
(...skipping 1388 matching lines...) Expand 10 before | Expand all | Expand 10 after
3994 POLICY_SCOPE_USER, 3991 POLICY_SCOPE_USER,
3995 POLICY_SOURCE_CLOUD, 3992 POLICY_SOURCE_CLOUD,
3996 new base::FundamentalValue(false), 3993 new base::FundamentalValue(false),
3997 NULL); 3994 NULL);
3998 UpdateProviderPolicy(policies); 3995 UpdateProviderPolicy(policies);
3999 EXPECT_FALSE(display_manager->unified_desktop_enabled()); 3996 EXPECT_FALSE(display_manager->unified_desktop_enabled());
4000 } 3997 }
4001 #endif // defined(OS_CHROMEOS) 3998 #endif // defined(OS_CHROMEOS)
4002 3999
4003 } // namespace policy 4000 } // namespace policy
OLDNEW
« no previous file with comments | « chrome/browser/net/dns_probe_browsertest.cc ('k') | chrome/browser/prerender/prerender_resource_throttle_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698