Index: chrome/browser/ui/browser_browsertest.cc |
diff --git a/chrome/browser/ui/browser_browsertest.cc b/chrome/browser/ui/browser_browsertest.cc |
index e6973466e3b8964614ba9af15415c523b3bc4187..0d5915e1a2aadb5509df68a2b2133902de8d02cb 100644 |
--- a/chrome/browser/ui/browser_browsertest.cc |
+++ b/chrome/browser/ui/browser_browsertest.cc |
@@ -12,6 +12,7 @@ |
#include "base/memory/scoped_ptr.h" |
#include "base/message_loop/message_loop.h" |
#include "base/prefs/pref_service.h" |
+#include "base/strings/string_split.h" |
#include "base/strings/utf_string_conversions.h" |
#include "base/sys_info.h" |
#include "chrome/app/chrome_command_ids.h" |
@@ -100,6 +101,8 @@ |
#include "net/base/net_errors.h" |
#include "net/dns/mock_host_resolver.h" |
#include "net/ssl/ssl_connection_status_flags.h" |
+#include "net/test/embedded_test_server/embedded_test_server.h" |
+#include "net/test/embedded_test_server/request_handler_util.h" |
#include "net/test/spawned_test_server/spawned_test_server.h" |
#include "net/test/url_request/url_request_mock_http_job.h" |
#include "net/url_request/url_request_filter.h" |
@@ -342,14 +345,14 @@ void ProceedThroughInterstitial(content::WebContents* web_contents) { |
observer.Wait(); |
} |
-bool GetFilePathWithHostAndPortReplacement( |
+void GetFilePathWithHostAndPortReplacement( |
const std::string& original_file_path, |
const net::HostPortPair& host_port_pair, |
std::string* replacement_path) { |
- std::vector<net::SpawnedTestServer::StringPair> replacement_text; |
+ base::StringPairs replacement_text; |
replacement_text.push_back( |
make_pair("REPLACE_WITH_HOST_AND_PORT", host_port_pair.ToString())); |
- return net::SpawnedTestServer::GetFilePathWithReplacements( |
+ net::test_server::GetFilePathWithReplacements( |
original_file_path, replacement_text, replacement_path); |
} |
@@ -643,7 +646,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, MAYBE_ThirtyFourTabs) { |
// a pending entry if we start from the NTP but not from a normal page. |
// See http://crbug.com/355537. |
IN_PROC_BROWSER_TEST_F(BrowserTest, ClearPendingOnFailUnlessNTP) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
WebContents* web_contents = |
browser()->tab_strip_model()->GetActiveWebContents(); |
GURL ntp_url(search::GetNewTabPageURL(browser()->profile())); |
@@ -651,7 +654,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, ClearPendingOnFailUnlessNTP) { |
// Navigate to a 204 URL (aborts with no content) on the NTP and make sure it |
// sticks around so that the user can edit it. |
- GURL abort_url(test_server()->GetURL("nocontent")); |
+ GURL abort_url(embedded_test_server()->GetURL("/nocontent")); |
{ |
content::WindowedNotificationObserver stop_observer( |
content::NOTIFICATION_LOAD_STOP, |
@@ -665,7 +668,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, ClearPendingOnFailUnlessNTP) { |
} |
// Navigate to a real URL. |
- GURL real_url(test_server()->GetURL("title1.html")); |
+ GURL real_url(embedded_test_server()->GetURL("/title1.html")); |
ui_test_utils::NavigateToURL(browser(), real_url); |
EXPECT_EQ(real_url, web_contents->GetVisibleURL()); |
@@ -687,9 +690,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, ClearPendingOnFailUnlessNTP) { |
// cross-process navigation is ready to commit. |
// Flaky test, see https://crbug.com/445155. |
IN_PROC_BROWSER_TEST_F(BrowserTest, DISABLED_CrossProcessNavCancelsDialogs) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
- GURL url(test_server()->GetURL("empty.html")); |
+ GURL url(embedded_test_server()->GetURL("/empty.html")); |
ui_test_utils::NavigateToURL(browser(), url); |
// Test this with multiple alert dialogs to ensure that we can navigate away |
@@ -715,9 +718,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, DISABLED_CrossProcessNavCancelsDialogs) { |
// Make sure that dialogs are closed after a renderer process dies, and that |
// subsequent navigations work. See http://crbug/com/343265. |
IN_PROC_BROWSER_TEST_F(BrowserTest, SadTabCancelsDialogs) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
- GURL beforeunload_url(test_server()->GetURL("files/beforeunload.html")); |
+ GURL beforeunload_url(embedded_test_server()->GetURL("/beforeunload.html")); |
ui_test_utils::NavigateToURL(browser(), beforeunload_url); |
// Start a navigation to trigger the beforeunload dialog. |
@@ -739,7 +742,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SadTabCancelsDialogs) { |
EXPECT_FALSE(dialog_queue->HasActiveDialog()); |
// Make sure subsequent navigations work. |
- GURL url2("http://www.example.com/files/empty.html"); |
+ GURL url2("http://www.example.com/empty.html"); |
ui_test_utils::NavigateToURL(browser(), url2); |
} |
@@ -774,8 +777,8 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SadTabCancelsSubframeDialogs) { |
// page is showing. See crbug.com/482380. |
IN_PROC_BROWSER_TEST_F(BrowserTest, InterstitialCancelsGuestViewDialogs) { |
// Navigate to a PDF, which is loaded within a guestview. |
- ASSERT_TRUE(test_server()->Start()); |
- GURL pdf_with_dialog(test_server()->GetURL("files/alert_dialog.pdf")); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ GURL pdf_with_dialog(embedded_test_server()->GetURL("/alert_dialog.pdf")); |
ui_test_utils::NavigateToURL(browser(), pdf_with_dialog); |
AppModalDialog* alert = ui_test_utils::WaitForAppModalDialog(); |
@@ -850,10 +853,10 @@ class RedirectObserver : public content::WebContentsObserver { |
// http://crbug.com/243957. |
IN_PROC_BROWSER_TEST_F(BrowserTest, NoStopDuringTransferUntilCommit) { |
// Create HTTP and HTTPS servers for a cross-site transition. |
- ASSERT_TRUE(test_server()->Start()); |
- net::SpawnedTestServer https_test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server.Start()); |
// Temporarily replace ContentBrowserClient with one that will cause a |
@@ -862,7 +865,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, NoStopDuringTransferUntilCommit) { |
content::ContentBrowserClient* old_client = |
SetBrowserClientForTesting(&new_client); |
- GURL init_url(test_server()->GetURL("files/title1.html")); |
+ GURL init_url(embedded_test_server()->GetURL("/title1.html")); |
ui_test_utils::NavigateToURL(browser(), init_url); |
// Navigate to a same-site page that redirects, causing a transfer. |
@@ -871,9 +874,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, NoStopDuringTransferUntilCommit) { |
// Create a RedirectObserver that goes away before we close the tab. |
{ |
RedirectObserver redirect_observer(contents); |
- GURL dest_url(https_test_server.GetURL("files/title2.html")); |
- GURL redirect_url(test_server()->GetURL("server-redirect?" + |
- dest_url.spec())); |
+ GURL dest_url(https_test_server.GetURL("/title2.html")); |
+ GURL redirect_url( |
+ embedded_test_server()->GetURL("/server-redirect?" + dest_url.spec())); |
ui_test_utils::NavigateToURL(browser(), redirect_url); |
// We should immediately see the new committed entry. |
@@ -901,10 +904,10 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, NoStopDuringTransferUntilCommit) { |
// handler to run once. |
IN_PROC_BROWSER_TEST_F(BrowserTest, SingleBeforeUnloadAfterRedirect) { |
// Create HTTP and HTTPS servers for a cross-site transition. |
- ASSERT_TRUE(test_server()->Start()); |
- net::SpawnedTestServer https_test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server.Start()); |
// Temporarily replace ContentBrowserClient with one that will cause a |
@@ -914,7 +917,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SingleBeforeUnloadAfterRedirect) { |
SetBrowserClientForTesting(&new_client); |
// Navigate to a page with a beforeunload handler. |
- GURL url(test_server()->GetURL("files/beforeunload.html")); |
+ GURL url(embedded_test_server()->GetURL("/beforeunload.html")); |
ui_test_utils::NavigateToURL(browser(), url); |
// Navigate to a URL that redirects to another process and approve the |
@@ -922,9 +925,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SingleBeforeUnloadAfterRedirect) { |
content::WindowedNotificationObserver nav_observer( |
content::NOTIFICATION_NAV_ENTRY_COMMITTED, |
content::NotificationService::AllSources()); |
- GURL https_url(https_test_server.GetURL("files/title1.html")); |
- GURL redirect_url(test_server()->GetURL("server-redirect?" + |
- https_url.spec())); |
+ GURL https_url(https_test_server.GetURL("/title1.html")); |
+ GURL redirect_url( |
+ embedded_test_server()->GetURL("/server-redirect?" + https_url.spec())); |
browser()->OpenURL(OpenURLParams(redirect_url, Referrer(), CURRENT_TAB, |
ui::PAGE_TRANSITION_TYPED, false)); |
AppModalDialog* alert = ui_test_utils::WaitForAppModalDialog(); |
@@ -945,8 +948,8 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, CancelBeforeUnloadResetsURL) { |
ui_test_utils::NavigateToURL(browser(), url); |
// Navigate to a page that triggers a cross-site transition. |
- ASSERT_TRUE(test_server()->Start()); |
- GURL url2(test_server()->GetURL("files/title1.html")); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ GURL url2(embedded_test_server()->GetURL("/title1.html")); |
browser()->OpenURL(OpenURLParams( |
url2, Referrer(), CURRENT_TAB, ui::PAGE_TRANSITION_TYPED, false)); |
@@ -1125,13 +1128,13 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, NullOpenerRedirectForksProcess) { |
switches::kDisablePopupBlocking); |
// Create http and https servers for a cross-site transition. |
- ASSERT_TRUE(test_server()->Start()); |
- net::SpawnedTestServer https_test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server.Start()); |
- GURL http_url(test_server()->GetURL("files/title1.html")); |
- GURL https_url(https_test_server.GetURL(std::string())); |
+ GURL http_url(embedded_test_server()->GetURL("/title1.html")); |
+ GURL https_url(https_test_server.GetURL(std::string("/"))); |
// Start with an http URL. |
ui_test_utils::NavigateToURL(browser(), http_url); |
@@ -1214,13 +1217,13 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, OtherRedirectsDontForkProcess) { |
switches::kDisablePopupBlocking); |
// Create http and https servers for a cross-site transition. |
- ASSERT_TRUE(test_server()->Start()); |
- net::SpawnedTestServer https_test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server.Start()); |
- GURL http_url(test_server()->GetURL("files/title1.html")); |
- GURL https_url(https_test_server.GetURL(std::string())); |
+ GURL http_url(embedded_test_server()->GetURL("/title1.html")); |
+ GURL https_url(https_test_server.GetURL("/")); |
// Start with an http URL. |
ui_test_utils::NavigateToURL(browser(), http_url); |
@@ -1319,8 +1322,8 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, CommandCreateAppShortcutHttp) { |
CommandUpdater* command_updater = |
browser()->command_controller()->command_updater(); |
- ASSERT_TRUE(test_server()->Start()); |
- GURL http_url(test_server()->GetURL(std::string())); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ GURL http_url(embedded_test_server()->GetURL("/")); |
ASSERT_TRUE(http_url.SchemeIs(url::kHttpScheme)); |
ui_test_utils::NavigateToURL(browser(), http_url); |
EXPECT_TRUE(command_updater->IsCommandEnabled(IDC_CREATE_SHORTCUTS)); |
@@ -1330,11 +1333,12 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, CommandCreateAppShortcutHttps) { |
CommandUpdater* command_updater = |
browser()->command_controller()->command_updater(); |
- net::SpawnedTestServer test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
- ASSERT_TRUE(test_server.Start()); |
- GURL https_url(test_server.GetURL("/")); |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
+ ASSERT_TRUE(https_test_server.Start()); |
+ |
+ GURL https_url(https_test_server.GetURL("/")); |
ASSERT_TRUE(https_url.SchemeIs(url::kHttpsScheme)); |
ui_test_utils::NavigateToURL(browser(), https_url); |
EXPECT_TRUE(command_updater->IsCommandEnabled(IDC_CREATE_SHORTCUTS)); |
@@ -1375,8 +1379,8 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, CommandCreateAppShortcutInvalid) { |
// Change a tab into an application window. |
// DISABLED: http://crbug.com/72310 |
IN_PROC_BROWSER_TEST_F(BrowserTest, DISABLED_ConvertTabToAppShortcut) { |
- ASSERT_TRUE(test_server()->Start()); |
- GURL http_url(test_server()->GetURL(std::string())); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ GURL http_url(embedded_test_server()->GetURL("/")); |
ASSERT_TRUE(http_url.SchemeIs(url::kHttpScheme)); |
ASSERT_EQ(1, browser()->tab_strip_model()->count()); |
@@ -1428,9 +1432,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, DISABLED_ConvertTabToAppShortcut) { |
// to an anchor in javascript body.onload handler. |
IN_PROC_BROWSER_TEST_F(BrowserTest, |
DISABLED_FaviconOfOnloadRedirectToAnchorPage) { |
- ASSERT_TRUE(test_server()->Start()); |
- GURL url(test_server()->GetURL("files/onload_redirect_to_anchor.html")); |
- GURL expected_favicon_url(test_server()->GetURL("files/test.png")); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ GURL url(embedded_test_server()->GetURL("/onload_redirect_to_anchor.html")); |
+ GURL expected_favicon_url(embedded_test_server()->GetURL("/test.png")); |
ui_test_utils::NavigateToURL(browser(), url); |
@@ -1473,9 +1477,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, MAYBE_FaviconChange) { |
// Makes sure TabClosing is sent when uninstalling an extension that is an app |
// tab. |
IN_PROC_BROWSER_TEST_F(BrowserTest, MAYBE_TabClosingWhenRemovingExtension) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
- GURL url(test_server()->GetURL("empty.html")); |
+ GURL url(embedded_test_server()->GetURL("/empty.html")); |
TabStripModel* model = browser()->tab_strip_model(); |
ASSERT_TRUE(LoadExtension(test_data_dir_.AppendASCII("app/"))); |
@@ -1516,7 +1520,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, MAYBE_TabClosingWhenRemovingExtension) { |
// Open with --app-id=<id>, and see that an application tab opens by default. |
IN_PROC_BROWSER_TEST_F(BrowserTest, AppIdSwitch) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
// There should be one tab to start with. |
ASSERT_EQ(1, browser()->tab_strip_model()->count()); |
@@ -1556,7 +1560,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, AppIdSwitch) { |
// Open an app window and the dev tools window and ensure that the location |
// bar settings are correct. |
IN_PROC_BROWSER_TEST_F(BrowserTest, ShouldShowLocationBar) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
// Load an app. |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
@@ -1609,11 +1613,11 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, ShouldShowLocationBar) { |
#if !defined(OS_CHROMEOS) |
// Makes sure pinned tabs are restored correctly on start. |
IN_PROC_BROWSER_TEST_F(BrowserTest, RestorePinnedTabs) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
// Add a pinned tab. |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
- GURL url(test_server()->GetURL("empty.html")); |
+ GURL url(embedded_test_server()->GetURL("/empty.html")); |
TabStripModel* model = browser()->tab_strip_model(); |
ui_test_utils::NavigateToURL(browser(), url); |
model->SetTabPinned(0, true); |
@@ -1680,7 +1684,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, CloseWithAppMenuOpen) { |
#if !defined(OS_MACOSX) |
IN_PROC_BROWSER_TEST_F(BrowserTest, OpenAppWindowLikeNtp) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
// Load an app |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
@@ -2008,9 +2012,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, MAYBE_PageZoom) { |
} |
IN_PROC_BROWSER_TEST_F(BrowserTest, InterstitialCommandDisable) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
- GURL url(test_server()->GetURL("empty.html")); |
+ GURL url(embedded_test_server()->GetURL("/empty.html")); |
ui_test_utils::NavigateToURL(browser(), url); |
CommandUpdater* command_updater = |
@@ -2051,9 +2055,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, InterstitialCommandDisable) { |
// Ensure that creating an interstitial page closes any JavaScript dialogs |
// that were present on the previous page. See http://crbug.com/295695. |
IN_PROC_BROWSER_TEST_F(BrowserTest, InterstitialClosesDialogs) { |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
host_resolver()->AddRule("www.example.com", "127.0.0.1"); |
- GURL url(test_server()->GetURL("empty.html")); |
+ GURL url(embedded_test_server()->GetURL("/empty.html")); |
ui_test_utils::NavigateToURL(browser(), url); |
WebContents* contents = browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -2129,8 +2133,8 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, UserGesturesReported) { |
browser()->tab_strip_model()->GetActiveWebContents(); |
MockWebContentsObserver mock_observer(web_contents); |
- ASSERT_TRUE(test_server()->Start()); |
- GURL url(test_server()->GetURL("empty.html")); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
+ GURL url(embedded_test_server()->GetURL("/empty.html")); |
ui_test_utils::NavigateToURL(browser(), url); |
EXPECT_TRUE(mock_observer.got_user_gesture()); |
@@ -2738,11 +2742,11 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, GetSizeForNewRenderView) { |
// visible_url=title1.html) |
browser()->profile()->GetPrefs()->SetBoolean(prefs::kWebKitJavascriptEnabled, |
false); |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
// Create an HTTPS server for cross-site transition. |
- net::SpawnedTestServer https_test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server.Start()); |
// Start with NTP. |
@@ -2759,7 +2763,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, GetSizeForNewRenderView) { |
// Navigate to a non-NTP page, without resizing WebContentsView. |
ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/title1.html")); |
+ embedded_test_server()->GetURL("/title1.html")); |
ASSERT_EQ(BookmarkBar::HIDDEN, browser()->bookmark_bar_state()); |
// A new RenderViewHost should be created. |
EXPECT_NE(prev_rvh, web_contents->GetRenderViewHost()); |
@@ -2797,7 +2801,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, GetSizeForNewRenderView) { |
// Navigate to another non-NTP page, without resizing WebContentsView. |
ui_test_utils::NavigateToURL(browser(), |
- https_test_server.GetURL("files/title2.html")); |
+ https_test_server.GetURL("/title2.html")); |
ASSERT_EQ(BookmarkBar::HIDDEN, browser()->bookmark_bar_state()); |
// A new RenderVieHost should be created. |
EXPECT_NE(prev_rvh, web_contents->GetRenderViewHost()); |
@@ -2817,7 +2821,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, GetSizeForNewRenderView) { |
gfx::Size wcv_resize_insets(1, 1); |
observer.set_wcv_resize_insets(wcv_resize_insets); |
ui_test_utils::NavigateToURL(browser(), |
- test_server()->GetURL("files/title2.html")); |
+ embedded_test_server()->GetURL("/title2.html")); |
ASSERT_EQ(BookmarkBar::HIDDEN, browser()->bookmark_bar_state()); |
gfx::Size rwhv_create_size2, rwhv_commit_size2, wcv_commit_size2; |
observer.GetSizeForRenderViewHost(web_contents->GetRenderViewHost(), |
@@ -2906,25 +2910,25 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, CanDuplicateTab) { |
// Tests that the WebContentsObserver::SecurityStyleChanged event fires |
// with the current style on HTTP, broken HTTPS, and valid HTTPS pages. |
IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserver) { |
- net::SpawnedTestServer https_test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
- net::SpawnedTestServer https_test_server_expired( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_EXPIRED), |
- base::FilePath(kDocRoot)); |
- |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server.Start()); |
+ |
+ net::EmbeddedTestServer https_test_server_expired( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server_expired.SetSSLConfig(net::EmbeddedTestServer::CERT_EXPIRED); |
+ https_test_server_expired.ServeFilesFromSourceDirectory( |
+ base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server_expired.Start()); |
- ASSERT_TRUE(test_server()->Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
content::WebContents* web_contents = |
browser()->tab_strip_model()->GetActiveWebContents(); |
SecurityStyleTestObserver observer(web_contents); |
// Visit an HTTP url. |
- GURL http_url(test_server()->GetURL(std::string())); |
+ GURL http_url(embedded_test_server()->GetURL("/")); |
ui_test_utils::NavigateToURL(browser(), http_url); |
EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED, |
observer.latest_security_style()); |
@@ -2937,9 +2941,9 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserver) { |
// Visit an (otherwise valid) HTTPS page that displays mixed content. |
std::string replacement_path; |
- ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( |
- "files/ssl/page_displays_insecure_content.html", |
- test_server()->host_port_pair(), &replacement_path)); |
+ GetFilePathWithHostAndPortReplacement( |
+ "/ssl/page_displays_insecure_content.html", |
+ embedded_test_server()->host_port_pair(), &replacement_path); |
GURL mixed_content_url(https_test_server.GetURL(replacement_path)); |
ui_test_utils::NavigateToURL(browser(), mixed_content_url); |
@@ -2961,7 +2965,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserver) { |
mixed_content_explanation.ran_insecure_content_style); |
// Visit a broken HTTPS url. |
- GURL expired_url(https_test_server_expired.GetURL(std::string())); |
+ GURL expired_url(https_test_server_expired.GetURL(std::string("/"))); |
ui_test_utils::NavigateToURL(browser(), expired_url); |
// An interstitial should show, and an event for the lock icon on the |
@@ -2977,7 +2981,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserver) { |
// Before clicking through, navigate to a different page, and then go |
// back to the interstitial. |
- GURL valid_https_url(https_test_server.GetURL(std::string())); |
+ GURL valid_https_url(https_test_server.GetURL(std::string("/"))); |
ui_test_utils::NavigateToURL(browser(), valid_https_url); |
EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, |
observer.latest_security_style()); |
@@ -3021,20 +3025,16 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserver) { |
// Visit a valid HTTPS page, then a broken HTTPS page, and then go back, |
// and test that the observed security style matches. |
IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserverGoBack) { |
- net::SpawnedTestServer https_test_server(net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(kDocRoot)); |
- |
- // Use a separate server to work around a mysterious SSL handshake |
- // timeout when both requests go to the same server. See |
- // https://crbug.com/515906. |
- net::SpawnedTestServer https_test_server_expired( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::SSLOptions( |
- net::SpawnedTestServer::SSLOptions::CERT_EXPIRED), |
- base::FilePath(kDocRoot)); |
- |
+ net::EmbeddedTestServer https_test_server( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server.ServeFilesFromSourceDirectory(base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server.Start()); |
+ |
+ net::EmbeddedTestServer https_test_server_expired( |
+ net::EmbeddedTestServer::TYPE_HTTPS); |
+ https_test_server_expired.SetSSLConfig(net::EmbeddedTestServer::CERT_EXPIRED); |
+ https_test_server_expired.ServeFilesFromSourceDirectory( |
+ base::FilePath(kDocRoot)); |
ASSERT_TRUE(https_test_server_expired.Start()); |
content::WebContents* web_contents = |
@@ -3042,7 +3042,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserverGoBack) { |
SecurityStyleTestObserver observer(web_contents); |
// Visit a valid HTTPS url. |
- GURL valid_https_url(https_test_server.GetURL(std::string())); |
+ GURL valid_https_url(https_test_server.GetURL(std::string("/"))); |
ui_test_utils::NavigateToURL(browser(), valid_https_url); |
EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, |
observer.latest_security_style()); |
@@ -3056,7 +3056,7 @@ IN_PROC_BROWSER_TEST_F(BrowserTest, SecurityStyleChangedObserverGoBack) { |
// Navigate to a bad HTTPS page on a different host, and then click |
// Back to verify that the previous good security style is seen again. |
- GURL expired_https_url(https_test_server_expired.GetURL(std::string())); |
+ GURL expired_https_url(https_test_server_expired.GetURL(std::string("/"))); |
host_resolver()->AddRule("www.example_broken.test", "127.0.0.1"); |
GURL::Replacements replace_host; |
replace_host.SetHostStr("www.example_broken.test"); |