| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <utility> | 5 #include <utility> |
| 6 | 6 |
| 7 #include "base/base_switches.h" | 7 #include "base/base_switches.h" |
| 8 #include "base/bind.h" | 8 #include "base/bind.h" |
| 9 #include "base/bind_helpers.h" | 9 #include "base/bind_helpers.h" |
| 10 #include "base/callback.h" | 10 #include "base/callback.h" |
| (...skipping 1102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1113 ProceedThroughInterstitial(tab); | 1113 ProceedThroughInterstitial(tab); |
| 1114 | 1114 |
| 1115 // Test page run a WebSocket wss connection test. The result will be shown | 1115 // Test page run a WebSocket wss connection test. The result will be shown |
| 1116 // as page title. | 1116 // as page title. |
| 1117 const base::string16 result = watcher.WaitAndGetTitle(); | 1117 const base::string16 result = watcher.WaitAndGetTitle(); |
| 1118 EXPECT_TRUE(base::LowerCaseEqualsASCII(result, "pass")); | 1118 EXPECT_TRUE(base::LowerCaseEqualsASCII(result, "pass")); |
| 1119 } | 1119 } |
| 1120 | 1120 |
| 1121 // Ensure that non-standard origins are marked correctly when the | 1121 // Ensure that non-standard origins are marked correctly when the |
| 1122 // MarkNonSecureAs field trial is enabled. | 1122 // MarkNonSecureAs field trial is enabled. |
| 1123 IN_PROC_BROWSER_TEST_F(SSLUITest, TestMarkNonSecureAs) { | 1123 // |
| 1124 // Disabled on Windows until `file:///` navigation works under OOPIF. |
| 1125 // https://crbug.com/574997 |
| 1126 #if defined(OS_WIN) |
| 1127 #define MAYBE_MarkFileAsNonSecure DISABLED_MarkFileAsNonSecure |
| 1128 #else |
| 1129 #define MAYBE_MarkFileAsNonSecure MarkFileAsNonSecure |
| 1130 #endif |
| 1131 IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_MarkFileAsNonSecure) { |
| 1124 scoped_refptr<base::FieldTrial> trial = | 1132 scoped_refptr<base::FieldTrial> trial = |
| 1125 base::FieldTrialList::CreateFieldTrial( | 1133 base::FieldTrialList::CreateFieldTrial( |
| 1126 "MarkNonSecureAs", | 1134 "MarkNonSecureAs", |
| 1127 security_state::switches::kMarkNonSecureAsNonSecure); | 1135 security_state::switches::kMarkNonSecureAsNonSecure); |
| 1128 | 1136 |
| 1129 content::WebContents* contents = | 1137 content::WebContents* contents = |
| 1130 browser()->tab_strip_model()->GetActiveWebContents(); | 1138 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1131 ASSERT_TRUE(contents); | 1139 ASSERT_TRUE(contents); |
| 1132 | 1140 |
| 1133 ChromeSecurityStateModelClient* model_client = | 1141 ChromeSecurityStateModelClient* model_client = |
| 1134 ChromeSecurityStateModelClient::FromWebContents(contents); | 1142 ChromeSecurityStateModelClient::FromWebContents(contents); |
| 1135 ASSERT_TRUE(model_client); | 1143 ASSERT_TRUE(model_client); |
| 1136 | 1144 |
| 1137 ui_test_utils::NavigateToURL(browser(), GURL("file:/")); | 1145 ui_test_utils::NavigateToURL(browser(), GURL("file:///")); |
| 1138 EXPECT_EQ(security_state::SecurityStateModel::NONE, | 1146 EXPECT_EQ(security_state::SecurityStateModel::NONE, |
| 1139 model_client->GetSecurityInfo().security_level); | 1147 model_client->GetSecurityInfo().security_level); |
| 1148 } |
| 1149 |
| 1150 IN_PROC_BROWSER_TEST_F(SSLUITest, MarkAboutAsNonSecure) { |
| 1151 scoped_refptr<base::FieldTrial> trial = |
| 1152 base::FieldTrialList::CreateFieldTrial( |
| 1153 "MarkNonSecureAs", |
| 1154 security_state::switches::kMarkNonSecureAsNonSecure); |
| 1155 |
| 1156 content::WebContents* contents = |
| 1157 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1158 ASSERT_TRUE(contents); |
| 1159 |
| 1160 ChromeSecurityStateModelClient* model_client = |
| 1161 ChromeSecurityStateModelClient::FromWebContents(contents); |
| 1162 ASSERT_TRUE(model_client); |
| 1140 | 1163 |
| 1141 ui_test_utils::NavigateToURL(browser(), GURL("about:blank")); | 1164 ui_test_utils::NavigateToURL(browser(), GURL("about:blank")); |
| 1142 EXPECT_EQ(security_state::SecurityStateModel::NONE, | 1165 EXPECT_EQ(security_state::SecurityStateModel::NONE, |
| 1143 model_client->GetSecurityInfo().security_level); | 1166 model_client->GetSecurityInfo().security_level); |
| 1167 } |
| 1168 |
| 1169 IN_PROC_BROWSER_TEST_F(SSLUITest, MarkDataAsNonSecure) { |
| 1170 scoped_refptr<base::FieldTrial> trial = |
| 1171 base::FieldTrialList::CreateFieldTrial( |
| 1172 "MarkNonSecureAs", |
| 1173 security_state::switches::kMarkNonSecureAsNonSecure); |
| 1174 |
| 1175 content::WebContents* contents = |
| 1176 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1177 ASSERT_TRUE(contents); |
| 1178 |
| 1179 ChromeSecurityStateModelClient* model_client = |
| 1180 ChromeSecurityStateModelClient::FromWebContents(contents); |
| 1181 ASSERT_TRUE(model_client); |
| 1144 | 1182 |
| 1145 ui_test_utils::NavigateToURL(browser(), GURL("data:text/plain,hello")); | 1183 ui_test_utils::NavigateToURL(browser(), GURL("data:text/plain,hello")); |
| 1146 EXPECT_EQ(security_state::SecurityStateModel::NONE, | 1184 EXPECT_EQ(security_state::SecurityStateModel::NONE, |
| 1147 model_client->GetSecurityInfo().security_level); | 1185 model_client->GetSecurityInfo().security_level); |
| 1186 } |
| 1187 |
| 1188 IN_PROC_BROWSER_TEST_F(SSLUITest, MarkBlobAsNonSecure) { |
| 1189 scoped_refptr<base::FieldTrial> trial = |
| 1190 base::FieldTrialList::CreateFieldTrial( |
| 1191 "MarkNonSecureAs", |
| 1192 security_state::switches::kMarkNonSecureAsNonSecure); |
| 1193 |
| 1194 content::WebContents* contents = |
| 1195 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1196 ASSERT_TRUE(contents); |
| 1197 |
| 1198 ChromeSecurityStateModelClient* model_client = |
| 1199 ChromeSecurityStateModelClient::FromWebContents(contents); |
| 1200 ASSERT_TRUE(model_client); |
| 1148 | 1201 |
| 1149 ui_test_utils::NavigateToURL( | 1202 ui_test_utils::NavigateToURL( |
| 1150 browser(), | 1203 browser(), |
| 1151 GURL("blob:chrome%3A//newtab/49a463bb-fac8-476c-97bf-5d7076c3ea1a")); | 1204 GURL("blob:chrome%3A//newtab/49a463bb-fac8-476c-97bf-5d7076c3ea1a")); |
| 1152 EXPECT_EQ(security_state::SecurityStateModel::NONE, | 1205 EXPECT_EQ(security_state::SecurityStateModel::NONE, |
| 1153 model_client->GetSecurityInfo().security_level); | 1206 model_client->GetSecurityInfo().security_level); |
| 1154 } | 1207 } |
| 1155 | 1208 |
| 1156 #if defined(USE_NSS_CERTS) | 1209 #if defined(USE_NSS_CERTS) |
| 1157 class SSLUITestWithClientCert : public SSLUITest { | 1210 class SSLUITestWithClientCert : public SSLUITest { |
| (...skipping 1773 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2931 | 2984 |
| 2932 // Visit a page over https that contains a frame with a redirect. | 2985 // Visit a page over https that contains a frame with a redirect. |
| 2933 | 2986 |
| 2934 // XMLHttpRequest insecure content in synchronous mode. | 2987 // XMLHttpRequest insecure content in synchronous mode. |
| 2935 | 2988 |
| 2936 // XMLHttpRequest insecure content in asynchronous mode. | 2989 // XMLHttpRequest insecure content in asynchronous mode. |
| 2937 | 2990 |
| 2938 // XMLHttpRequest over bad ssl in synchronous mode. | 2991 // XMLHttpRequest over bad ssl in synchronous mode. |
| 2939 | 2992 |
| 2940 // XMLHttpRequest over OK ssl in synchronous mode. | 2993 // XMLHttpRequest over OK ssl in synchronous mode. |
| OLD | NEW |