Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(633)

Side by Side Diff: chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc

Issue 2225213004: Teach SSLHostStateDelegate about subresources with cert errors (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ssl/chrome_ssl_host_state_delegate.h" 5 #include "chrome/browser/ssl/chrome_ssl_host_state_delegate.h"
6 6
7 #include <stdint.h> 7 #include <stdint.h>
8 #include <utility> 8 #include <utility>
9 9
10 #include "base/command_line.h" 10 #include "base/command_line.h"
(...skipping 178 matching lines...) Expand 10 before | Expand all | Expand 10 after
189 // DidHostRunInsecureContent unit tests the expected behavior of calling 189 // DidHostRunInsecureContent unit tests the expected behavior of calling
190 // DidHostRunInsecureContent as well as HostRanInsecureContent to check if 190 // DidHostRunInsecureContent as well as HostRanInsecureContent to check if
191 // insecure content has been run and to mark it as such. 191 // insecure content has been run and to mark it as such.
192 IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, 192 IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest,
193 DidHostRunInsecureContent) { 193 DidHostRunInsecureContent) {
194 content::WebContents* tab = 194 content::WebContents* tab =
195 browser()->tab_strip_model()->GetActiveWebContents(); 195 browser()->tab_strip_model()->GetActiveWebContents();
196 Profile* profile = Profile::FromBrowserContext(tab->GetBrowserContext()); 196 Profile* profile = Profile::FromBrowserContext(tab->GetBrowserContext());
197 content::SSLHostStateDelegate* state = profile->GetSSLHostStateDelegate(); 197 content::SSLHostStateDelegate* state = profile->GetSSLHostStateDelegate();
198 198
199 EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 42)); 199 EXPECT_FALSE(state->DidHostRunInsecureContent(
200 EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 191)); 200 "www.google.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
201 EXPECT_FALSE(state->DidHostRunInsecureContent("example.com", 42)); 201 EXPECT_FALSE(state->DidHostRunInsecureContent(
202 "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
203 EXPECT_FALSE(state->DidHostRunInsecureContent(
204 "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
202 205
203 state->HostRanInsecureContent("www.google.com", 42); 206 state->HostRanInsecureContent("www.google.com", 42,
207 content::SSLHostStateDelegate::MIXED_CONTENT);
204 208
205 EXPECT_TRUE(state->DidHostRunInsecureContent("www.google.com", 42)); 209 EXPECT_TRUE(state->DidHostRunInsecureContent(
206 EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 191)); 210 "www.google.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
207 EXPECT_FALSE(state->DidHostRunInsecureContent("example.com", 42)); 211 EXPECT_FALSE(state->DidHostRunInsecureContent(
212 "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
213 EXPECT_FALSE(state->DidHostRunInsecureContent(
214 "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
208 215
209 state->HostRanInsecureContent("example.com", 42); 216 state->HostRanInsecureContent("example.com", 42,
217 content::SSLHostStateDelegate::MIXED_CONTENT);
210 218
211 EXPECT_TRUE(state->DidHostRunInsecureContent("www.google.com", 42)); 219 EXPECT_TRUE(state->DidHostRunInsecureContent(
212 EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 191)); 220 "www.google.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
213 EXPECT_TRUE(state->DidHostRunInsecureContent("example.com", 42)); 221 EXPECT_FALSE(state->DidHostRunInsecureContent(
222 "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
223 EXPECT_TRUE(state->DidHostRunInsecureContent(
224 "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
225
226 state->HostRanInsecureContent(
227 "example.com", 42, content::SSLHostStateDelegate::CERT_ERRORS_CONTENT);
228 EXPECT_FALSE(state->DidHostRunInsecureContent(
229 "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
230 EXPECT_TRUE(state->DidHostRunInsecureContent(
231 "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
232 EXPECT_TRUE(state->DidHostRunInsecureContent(
233 "example.com", 42, content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
234
235 state->HostRanInsecureContent(
jww 2016/08/11 18:50:15 This looks identical to the set of tests right abo
estark 2016/08/11 20:58:38 As best as I can interpret past-Emily's intentions
236 "www.google.com", 191,
237 content::SSLHostStateDelegate::CERT_ERRORS_CONTENT);
238 EXPECT_TRUE(state->DidHostRunInsecureContent(
239 "www.google.com", 191,
240 content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
241 EXPECT_FALSE(state->DidHostRunInsecureContent(
242 "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
214 } 243 }
215 244
216 // Test the migration code needed as a result of changing how the content 245 // Test the migration code needed as a result of changing how the content
217 // setting is stored. We used to map the settings dictionary to the pattern 246 // setting is stored. We used to map the settings dictionary to the pattern
218 // pair <origin, origin> but now we map it to <origin, wildcard>. 247 // pair <origin, origin> but now we map it to <origin, wildcard>.
219 IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, Migrate) { 248 IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, Migrate) {
220 scoped_refptr<net::X509Certificate> cert = GetOkCert(); 249 scoped_refptr<net::X509Certificate> cert = GetOkCert();
221 content::WebContents* tab = 250 content::WebContents* tab =
222 browser()->tab_strip_model()->GetActiveWebContents(); 251 browser()->tab_strip_model()->GetActiveWebContents();
223 Profile* profile = Profile::FromBrowserContext(tab->GetBrowserContext()); 252 Profile* profile = Profile::FromBrowserContext(tab->GetBrowserContext());
(...skipping 400 matching lines...) Expand 10 before | Expand all | Expand 10 after
624 EXPECT_EQ( 653 EXPECT_EQ(
625 content::SSLHostStateDelegate::ALLOWED, 654 content::SSLHostStateDelegate::ALLOWED,
626 state->QueryPolicy("localhost", *cert, 655 state->QueryPolicy("localhost", *cert,
627 net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value)); 656 net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value));
628 657
629 EXPECT_EQ( 658 EXPECT_EQ(
630 content::SSLHostStateDelegate::ALLOWED, 659 content::SSLHostStateDelegate::ALLOWED,
631 state->QueryPolicy("127.0.0.1", *cert, 660 state->QueryPolicy("127.0.0.1", *cert,
632 net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value)); 661 net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value));
633 } 662 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698