| Index: chrome/browser/download/download_target_determiner_unittest.cc
|
| diff --git a/chrome/browser/download/download_target_determiner_unittest.cc b/chrome/browser/download/download_target_determiner_unittest.cc
|
| index e443b2d3e400766dc7ce82ec60887943d37c77c6..9cec6efb3b7ae9719a958ca68e529a69bcf54157 100644
|
| --- a/chrome/browser/download/download_target_determiner_unittest.cc
|
| +++ b/chrome/browser/download/download_target_determiner_unittest.cc
|
| @@ -512,44 +512,44 @@ void NotifyExtensionsOverridePath(
|
|
|
| TEST_F(DownloadTargetDeterminerTest, Basic) {
|
| const DownloadTestCase kBasicTestCases[] = {
|
| - {// 0: Automatic Safe
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| - "text/plain", FILE_PATH_LITERAL(""),
|
| + {// 0: Automatic Safe
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| + "text/plain", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_CRDOWNLOAD},
|
| + EXPECT_CRDOWNLOAD},
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| - {// 1: Save_As Safe
|
| - SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| - "text/plain", FILE_PATH_LITERAL(""),
|
| +#if !defined(OS_ANDROID)
|
| + {// 1: Save_As Safe
|
| + SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| + "text/plain", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| + FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
|
|
| - EXPECT_CRDOWNLOAD},
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| + EXPECT_CRDOWNLOAD},
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| - {// 2: Automatic Dangerous
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE,
|
| - DownloadFileType::ALLOW_ON_USER_GESTURE, "http://example.com/foo.crx",
|
| - "", FILE_PATH_LITERAL(""),
|
| + {// 2: Automatic Dangerous
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE,
|
| + DownloadFileType::ALLOW_ON_USER_GESTURE, "http://example.com/foo.crx", "",
|
| + FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
|
|
| - {// 3: Forced Safe
|
| - FORCED, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt", "",
|
| - FILE_PATH_LITERAL("forced-foo.txt"),
|
| + {// 3: Forced Safe
|
| + FORCED, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt", "",
|
| + FILE_PATH_LITERAL("forced-foo.txt"),
|
|
|
| - FILE_PATH_LITERAL("forced-foo.txt"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("forced-foo.txt"),
|
| + DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_LOCAL_PATH},
|
| + EXPECT_LOCAL_PATH},
|
| };
|
|
|
| // The test assumes that .crx files have a danger level of
|
| @@ -560,7 +560,7 @@ TEST_F(DownloadTargetDeterminerTest, Basic) {
|
| RunTestCasesWithActiveItem(kBasicTestCases, arraysize(kBasicTestCases));
|
| }
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if !defined(OS_ANDROID)
|
| TEST_F(DownloadTargetDeterminerTest, CancelSaveAs) {
|
| const DownloadTestCase kCancelSaveAsTestCases[] = {
|
| {// 0: Save_As Safe, Cancelled.
|
| @@ -576,73 +576,72 @@ TEST_F(DownloadTargetDeterminerTest, CancelSaveAs) {
|
| RunTestCasesWithActiveItem(kCancelSaveAsTestCases,
|
| arraysize(kCancelSaveAsTestCases));
|
| }
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| // The SafeBrowsing check is performed early. Make sure that a download item
|
| // that has been marked as DANGEROUS_URL behaves correctly.
|
| TEST_F(DownloadTargetDeterminerTest, DangerousUrl) {
|
| const DownloadTestCase kSafeBrowsingTestCases[] = {
|
| - {// 0: Automatic Dangerous URL
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.txt",
|
| - "", FILE_PATH_LITERAL(""),
|
| + {// 0: Automatic Dangerous URL
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.txt", "",
|
| + FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| - {// 1: Save As Dangerous URL
|
| - SAVE_AS, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.txt",
|
| - "", FILE_PATH_LITERAL(""),
|
| +#if !defined(OS_ANDROID)
|
| + {// 1: Save As Dangerous URL
|
| + SAVE_AS, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.txt", "",
|
| + FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| + FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| + EXPECT_UNCONFIRMED},
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| - {// 2: Forced Dangerous URL
|
| - FORCED, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.txt",
|
| - "", FILE_PATH_LITERAL("forced-foo.txt"),
|
| + {// 2: Forced Dangerous URL
|
| + FORCED, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.txt", "",
|
| + FILE_PATH_LITERAL("forced-foo.txt"),
|
|
|
| - FILE_PATH_LITERAL("forced-foo.txt"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("forced-foo.txt"),
|
| + DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
|
|
| - {// 3: Automatic Dangerous URL + Dangerous file. Dangerous URL takes
|
| - // precedence.
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.html",
|
| - "", FILE_PATH_LITERAL(""),
|
| + {// 3: Automatic Dangerous URL + Dangerous file. Dangerous URL takes
|
| + // precedence.
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.html",
|
| + "", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.html"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.html"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| - {// 4: Save As Dangerous URL + Dangerous file
|
| - SAVE_AS, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.html",
|
| - "", FILE_PATH_LITERAL(""),
|
| +#if !defined(OS_ANDROID)
|
| + {// 4: Save As Dangerous URL + Dangerous file
|
| + SAVE_AS, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.html",
|
| + "", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.html"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| + FILE_PATH_LITERAL("foo.html"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| + EXPECT_UNCONFIRMED},
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| - {// 5: Forced Dangerous URL + Dangerous file
|
| - FORCED, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.html",
|
| - "", FILE_PATH_LITERAL("forced-foo.html"),
|
| + {// 5: Forced Dangerous URL + Dangerous file
|
| + FORCED, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_URL,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.html",
|
| + "", FILE_PATH_LITERAL("forced-foo.html"),
|
|
|
| - FILE_PATH_LITERAL("forced-foo.html"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("forced-foo.html"),
|
| + DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
| };
|
|
|
| ON_CALL(*delegate(), CheckDownloadUrl(_, _, _))
|
| @@ -656,45 +655,44 @@ TEST_F(DownloadTargetDeterminerTest, DangerousUrl) {
|
| // that has been marked as MAYBE_DANGEROUS_CONTENT behaves correctly.
|
| TEST_F(DownloadTargetDeterminerTest, MaybeDangerousContent) {
|
| const DownloadTestCase kSafeBrowsingTestCases[] = {
|
| - {// 0: Automatic Maybe dangerous content
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| - DownloadFileType::ALLOW_ON_USER_GESTURE,
|
| - "http://phishing.example.com/foo.crx", "", FILE_PATH_LITERAL(""),
|
| -
|
| - FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + {// 0: Automatic Maybe dangerous content
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| + DownloadFileType::ALLOW_ON_USER_GESTURE,
|
| + "http://phishing.example.com/foo.crx", "", FILE_PATH_LITERAL(""),
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - {// 1: Automatic Maybe dangerous content with DANGEROUS type.
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| - DownloadFileType::DANGEROUS, "http://phishing.example.com/foo.swf", "",
|
| - FILE_PATH_LITERAL(""),
|
| + EXPECT_UNCONFIRMED},
|
|
|
| - FILE_PATH_LITERAL("foo.swf"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + {// 1: Automatic Maybe dangerous content with DANGEROUS type.
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| + DownloadFileType::DANGEROUS, "http://phishing.example.com/foo.swf", "",
|
| + FILE_PATH_LITERAL(""),
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + FILE_PATH_LITERAL("foo.swf"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| + EXPECT_UNCONFIRMED},
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| - {// 2: Save As Maybe dangerous content
|
| - SAVE_AS, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.crx",
|
| - "", FILE_PATH_LITERAL(""),
|
| +#if !defined(OS_ANDROID)
|
| + {// 2: Save As Maybe dangerous content
|
| + SAVE_AS, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.crx", "",
|
| + FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| + FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| + EXPECT_UNCONFIRMED},
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| - {// 3: Forced Maybe dangerous content
|
| - FORCED, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| - DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.crx",
|
| - "", FILE_PATH_LITERAL("forced-foo.crx"),
|
| + {// 3: Forced Maybe dangerous content
|
| + FORCED, content::DOWNLOAD_DANGER_TYPE_MAYBE_DANGEROUS_CONTENT,
|
| + DownloadFileType::NOT_DANGEROUS, "http://phishing.example.com/foo.crx", "",
|
| + FILE_PATH_LITERAL("forced-foo.crx"),
|
|
|
| - FILE_PATH_LITERAL("forced-foo.crx"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("forced-foo.crx"),
|
| + DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
| };
|
|
|
| // Test assumptions:
|
| @@ -712,7 +710,7 @@ TEST_F(DownloadTargetDeterminerTest, MaybeDangerousContent) {
|
| arraysize(kSafeBrowsingTestCases));
|
| }
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if !defined(OS_ANDROID)
|
| // Test whether the last saved directory is used for 'Save As' downloads.
|
| TEST_F(DownloadTargetDeterminerTest, LastSavePath) {
|
| const DownloadTestCase kLastSavePathTestCasesPre[] = {
|
| @@ -801,7 +799,7 @@ TEST_F(DownloadTargetDeterminerTest, LastSavePath) {
|
| arraysize(kLastSavePathTestCasesVirtual));
|
| }
|
| }
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| // These tests are run with the default downloads folder set to a virtual
|
| // directory.
|
| @@ -829,7 +827,7 @@ TEST_F(DownloadTargetDeterminerTest, DefaultVirtual) {
|
| RunTestCasesWithActiveItem(&kAutomaticDownloadToVirtualDir, 1);
|
| }
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if !defined(OS_ANDROID)
|
| {
|
| SCOPED_TRACE(testing::Message() << "Save As to virtual directory");
|
| const DownloadTestCase kSaveAsToVirtualDir = {
|
| @@ -874,7 +872,7 @@ TEST_F(DownloadTargetDeterminerTest, DefaultVirtual) {
|
| GetPathInDownloadDir(FILE_PATH_LITERAL("foo-x.txt")))));
|
| RunTestCasesWithActiveItem(&kSaveAsToLocalDir, 1);
|
| }
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| {
|
| SCOPED_TRACE(testing::Message() << "Forced safe download");
|
| @@ -898,23 +896,23 @@ TEST_F(DownloadTargetDeterminerTest, DefaultVirtual) {
|
| // path.
|
| TEST_F(DownloadTargetDeterminerTest, InactiveDownload) {
|
| const DownloadTestCase kInactiveTestCases[] = {
|
| - {AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| - "text/plain", FILE_PATH_LITERAL(""),
|
| + {AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| + "text/plain", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_CRDOWNLOAD},
|
| + EXPECT_CRDOWNLOAD},
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| - {SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| - "text/plain", FILE_PATH_LITERAL(""),
|
| +#if !defined(OS_ANDROID)
|
| + {SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| + "text/plain", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| + FILE_PATH_LITERAL("foo.txt"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
|
|
| - EXPECT_CRDOWNLOAD}
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| + EXPECT_CRDOWNLOAD}
|
| +#endif // !defined(OS_ANDROID)
|
| };
|
|
|
| for (size_t i = 0; i < arraysize(kInactiveTestCases); ++i) {
|
| @@ -984,48 +982,46 @@ TEST_F(DownloadTargetDeterminerTest, LocalPathFailed) {
|
| // download and whether the referrer was visited prior to today.
|
| TEST_F(DownloadTargetDeterminerTest, VisitedReferrer) {
|
| const DownloadTestCase kVisitedReferrerCases[] = {
|
| - // http://visited.example.com/ is added to the history as a visit that
|
| - // happened prior to today.
|
| - {// 0: Safe download due to visiting referrer before.
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://visited.example.com/foo.crx",
|
| - "application/xml", FILE_PATH_LITERAL(""),
|
| + // http://visited.example.com/ is added to the history as a visit that
|
| + // happened prior to today.
|
| + {// 0: Safe download due to visiting referrer before.
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://visited.example.com/foo.crx",
|
| + "application/xml", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_CRDOWNLOAD},
|
| + EXPECT_CRDOWNLOAD},
|
|
|
| - {// 1: Dangerous due to not having visited referrer before.
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE,
|
| - DownloadFileType::ALLOW_ON_USER_GESTURE,
|
| - "http://not-visited.example.com/foo.crx", "application/xml",
|
| - FILE_PATH_LITERAL(""),
|
| + {// 1: Dangerous due to not having visited referrer before.
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE,
|
| + DownloadFileType::ALLOW_ON_USER_GESTURE,
|
| + "http://not-visited.example.com/foo.crx", "application/xml",
|
| + FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| - {// 2: Safe because the user is being prompted.
|
| - SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS,
|
| - "http://not-visited.example.com/foo.crx", "application/xml",
|
| - FILE_PATH_LITERAL(""),
|
| +#if !defined(OS_ANDROID)
|
| + {// 2: Safe because the user is being prompted.
|
| + SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://not-visited.example.com/foo.crx",
|
| + "application/xml", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| + FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_PROMPT,
|
|
|
| - EXPECT_CRDOWNLOAD},
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| + EXPECT_CRDOWNLOAD},
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| - {// 3: Safe because of forced path.
|
| - FORCED, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS,
|
| - "http://not-visited.example.com/foo.crx", "application/xml",
|
| - FILE_PATH_LITERAL("foo.crx"),
|
| + {// 3: Safe because of forced path.
|
| + FORCED, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://not-visited.example.com/foo.crx",
|
| + "application/xml", FILE_PATH_LITERAL("foo.crx"),
|
|
|
| - FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("foo.crx"), DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_LOCAL_PATH},
|
| + EXPECT_LOCAL_PATH},
|
| };
|
|
|
| // This test assumes that the danger level of .crx files is
|
| @@ -1171,7 +1167,7 @@ TEST_F(DownloadTargetDeterminerTest, TransitionType) {
|
| }
|
| }
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if !defined(OS_ANDROID)
|
| // These test cases are run with "Prompt for download" user preference set to
|
| // true.
|
| TEST_F(DownloadTargetDeterminerTest, PromptAlways) {
|
| @@ -1213,7 +1209,7 @@ TEST_F(DownloadTargetDeterminerTest, PromptAlways) {
|
| RunTestCasesWithActiveItem(kPromptingTestCases,
|
| arraysize(kPromptingTestCases));
|
| }
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| #if BUILDFLAG(ENABLE_EXTENSIONS)
|
| // These test cases are run with "Prompt for download" user preference set to
|
| @@ -1296,47 +1292,47 @@ TEST_F(DownloadTargetDeterminerTest, ManagedPath) {
|
| // filenames.
|
| TEST_F(DownloadTargetDeterminerTest, NotifyExtensionsSafe) {
|
| const DownloadTestCase kNotifyExtensionsTestCases[] = {
|
| - {// 0: Automatic Safe
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| - "text/plain", FILE_PATH_LITERAL(""),
|
| + {// 0: Automatic Safe
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| + "text/plain", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("overridden/foo.txt"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("overridden/foo.txt"),
|
| + DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_CRDOWNLOAD},
|
| + EXPECT_CRDOWNLOAD},
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| - {// 1: Save_As Safe
|
| - SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| - "text/plain", FILE_PATH_LITERAL(""),
|
| +#if !defined(OS_ANDROID)
|
| + {// 1: Save_As Safe
|
| + SAVE_AS, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt",
|
| + "text/plain", FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("overridden/foo.txt"),
|
| - DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| + FILE_PATH_LITERAL("overridden/foo.txt"),
|
| + DownloadItem::TARGET_DISPOSITION_PROMPT,
|
|
|
| - EXPECT_CRDOWNLOAD},
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| + EXPECT_CRDOWNLOAD},
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| - {// 2: Automatic Dangerous
|
| - AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE,
|
| - DownloadFileType::ALLOW_ON_USER_GESTURE, "http://example.com/foo.crx",
|
| - "", FILE_PATH_LITERAL(""),
|
| + {// 2: Automatic Dangerous
|
| + AUTOMATIC, content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE,
|
| + DownloadFileType::ALLOW_ON_USER_GESTURE, "http://example.com/foo.crx", "",
|
| + FILE_PATH_LITERAL(""),
|
|
|
| - FILE_PATH_LITERAL("overridden/foo.crx"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("overridden/foo.crx"),
|
| + DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_UNCONFIRMED},
|
| + EXPECT_UNCONFIRMED},
|
|
|
| - {// 3: Forced Safe
|
| - FORCED, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| - DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt", "",
|
| - FILE_PATH_LITERAL("forced-foo.txt"),
|
| + {// 3: Forced Safe
|
| + FORCED, content::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
| + DownloadFileType::NOT_DANGEROUS, "http://example.com/foo.txt", "",
|
| + FILE_PATH_LITERAL("forced-foo.txt"),
|
|
|
| - FILE_PATH_LITERAL("forced-foo.txt"),
|
| - DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| + FILE_PATH_LITERAL("forced-foo.txt"),
|
| + DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
|
|
| - EXPECT_LOCAL_PATH},
|
| + EXPECT_LOCAL_PATH},
|
| };
|
|
|
| ON_CALL(*delegate(), NotifyExtensions(_, _, _))
|
| @@ -1431,7 +1427,7 @@ TEST_F(DownloadTargetDeterminerTest, NotifyExtensionsConflict) {
|
| RunTestCase(test_case, base::FilePath(), item.get());
|
| }
|
|
|
| -#if !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if !defined(OS_ANDROID)
|
| // Test that relative paths returned by extensions are always relative to the
|
| // default downloads path.
|
| TEST_F(DownloadTargetDeterminerTest, NotifyExtensionsDefaultPath) {
|
| @@ -1468,7 +1464,7 @@ TEST_F(DownloadTargetDeterminerTest, NotifyExtensionsDefaultPath) {
|
| ScheduleCallback(full_overridden_path)));
|
| RunTestCase(test_case, base::FilePath(), item.get());
|
| }
|
| -#endif // !BUILDFLAG(ANDROID_JAVA_UI)
|
| +#endif // !defined(OS_ANDROID)
|
|
|
| TEST_F(DownloadTargetDeterminerTest, InitialVirtualPathUnsafe) {
|
| const base::FilePath::CharType* kInitialPath =
|
| @@ -1636,7 +1632,7 @@ TEST_F(DownloadTargetDeterminerTest, ResumedWithPrompt) {
|
| "text/plain", FILE_PATH_LITERAL(""),
|
|
|
| FILE_PATH_LITERAL("foo.txt"),
|
| -#if BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if defined(OS_ANDROID)
|
| DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| #else
|
| DownloadItem::TARGET_DISPOSITION_PROMPT,
|
| @@ -1655,7 +1651,7 @@ TEST_F(DownloadTargetDeterminerTest, ResumedWithPrompt) {
|
| {
|
| // 2: Automatic Dangerous
|
| AUTOMATIC,
|
| -#if BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if defined(OS_ANDROID)
|
| // If we don't prompt user, the file will be treated as dangerous.
|
| content::DOWNLOAD_DANGER_TYPE_DANGEROUS_FILE,
|
| DownloadFileType::ALLOW_ON_USER_GESTURE,
|
| @@ -1666,7 +1662,7 @@ TEST_F(DownloadTargetDeterminerTest, ResumedWithPrompt) {
|
| "http://example.com/foo.crx", "", FILE_PATH_LITERAL(""),
|
|
|
| FILE_PATH_LITERAL("foo.crx"),
|
| -#if BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if defined(OS_ANDROID)
|
| DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
| // Dangerous download will have an unconfirmed intermediate file name.
|
| EXPECT_UNCONFIRMED,
|
| @@ -1695,7 +1691,7 @@ TEST_F(DownloadTargetDeterminerTest, ResumedWithPrompt) {
|
| EXPECT_CALL(*delegate(), NotifyExtensions(_, _, _))
|
| .Times(test_case.test_type == AUTOMATIC ? 1 : 0);
|
| EXPECT_CALL(*delegate(), ReserveVirtualPath(_, expected_path, false, _, _));
|
| -#if BUILDFLAG(ANDROID_JAVA_UI)
|
| +#if defined(OS_ANDROID)
|
| EXPECT_CALL(*delegate(), PromptUserForDownloadPath(_, expected_path, _))
|
| .Times(0);
|
| #else
|
|
|