Index: chrome/browser/download/download_target_determiner_unittest.cc |
diff --git a/chrome/browser/download/download_target_determiner_unittest.cc b/chrome/browser/download/download_target_determiner_unittest.cc |
index 26f67397b9caae1b78a73cdac0d0f77522bb45f7..295929d00ee1c9fb4286df8be224e34eed9a794e 100644 |
--- a/chrome/browser/download/download_target_determiner_unittest.cc |
+++ b/chrome/browser/download/download_target_determiner_unittest.cc |
@@ -1861,7 +1861,6 @@ class DownloadTargetDeterminerTestWithPlugin |
content::PluginService* plugin_service = |
content::PluginService::GetInstance(); |
plugin_service->Init(); |
- plugin_service->DisablePluginsDiscoveryForTesting(); |
old_plugin_service_filter_ = plugin_service->GetFilter(); |
plugin_service->SetFilter(&mock_plugin_filter_); |
} |
@@ -2019,72 +2018,6 @@ TEST_F(DownloadTargetDeterminerTestWithPlugin, |
EXPECT_FALSE(target_info->is_filetype_handled_safely); |
} |
-// Check if secure handling of filetypes is determined correctly for NPAPI |
-// plugins. |
-TEST_F(DownloadTargetDeterminerTestWithPlugin, |
- TargetDeterminer_CheckForSecureHandling_NPAPI) { |
- // All test cases run with GetPathInDownloadDir(kInitialPath) as the inital |
- // path. |
- const base::FilePath::CharType kInitialPath[] = |
- FILE_PATH_LITERAL("some_path/bar.txt"); |
- const char kTestMIMEType[] = "application/x-example-should-not-exist"; |
- |
- DownloadTestCase kSecureHandlingTestCase = { |
- AUTOMATIC, |
- content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS, |
- download_util::NOT_DANGEROUS, |
- "http://example.com/foo.fakeext", |
- "", |
- FILE_PATH_LITERAL(""), |
- |
- FILE_PATH_LITERAL("foo.fakeext"), |
- DownloadItem::TARGET_DISPOSITION_OVERWRITE, |
- |
- EXPECT_CRDOWNLOAD}; |
- |
- content::PluginService* plugin_service = |
- content::PluginService::GetInstance(); |
- |
- // Can't run this test if NPAPI isn't supported. |
- if (!plugin_service->NPAPIPluginsSupported()) |
- return; |
- |
- // Verify our test assumptions. |
- { |
- ForceRefreshOfPlugins(); |
- std::vector<content::WebPluginInfo> info; |
- ASSERT_FALSE(plugin_service->GetPluginInfoArray( |
- GURL(), kTestMIMEType, false, &info, NULL)); |
- ASSERT_EQ(0u, info.size()) |
- << "Name: " << info[0].name << ", Path: " << info[0].path.value(); |
- } |
- |
- ON_CALL(*delegate(), GetFileMimeType( |
- GetPathInDownloadDir(FILE_PATH_LITERAL("foo.fakeext")), _)) |
- .WillByDefault(WithArg<1>( |
- ScheduleCallback(kTestMIMEType))); |
- scoped_ptr<content::MockDownloadItem> item( |
- CreateActiveDownloadItem(1, kSecureHandlingTestCase)); |
- scoped_ptr<DownloadTargetInfo> target_info = |
- RunDownloadTargetDeterminer(GetPathInDownloadDir(kInitialPath), |
- item.get()); |
- EXPECT_FALSE(target_info->is_filetype_handled_safely); |
- |
- // Register a NPAPI plugin. This should not count as handling the filetype |
- // securely. |
- ScopedRegisterInternalPlugin npapi_plugin( |
- plugin_service, |
- content::WebPluginInfo::PLUGIN_TYPE_NPAPI, |
- test_download_dir().AppendASCII("npapi"), |
- kTestMIMEType, |
- "fakeext"); |
- EXPECT_CALL(mock_plugin_filter_, MockPluginAvailable(npapi_plugin.path())) |
- .WillRepeatedly(Return(true)); |
- |
- target_info = RunDownloadTargetDeterminer( |
- GetPathInDownloadDir(kInitialPath), item.get()); |
- EXPECT_FALSE(target_info->is_filetype_handled_safely); |
-} |
#endif // defined(ENABLE_PLUGINS) |
} // namespace |