Chromium Code Reviews| Index: chrome/browser/ssl/ssl_browser_tests.cc | 
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc | 
| index 169a55beaabd1ba6c20bffcc897328375fa8a76f..8797d940fe276fff0a4147d0ee9ef2bc894efe22 100644 | 
| --- a/chrome/browser/ssl/ssl_browser_tests.cc | 
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc | 
| @@ -4,6 +4,7 @@ | 
| #include <utility> | 
| +#include "base/base64.h" | 
| #include "base/base_switches.h" | 
| #include "base/bind.h" | 
| #include "base/bind_helpers.h" | 
| @@ -53,6 +54,7 @@ | 
| #include "chrome/common/chrome_switches.h" | 
| #include "chrome/common/pref_names.h" | 
| #include "chrome/test/base/in_process_browser_test.h" | 
| +#include "chrome/test/base/test_launcher_utils.h" | 
| #include "chrome/test/base/ui_test_utils.h" | 
| #include "components/content_settings/core/browser/host_content_settings_map.h" | 
| #include "components/network_time/network_time_test_utils.h" | 
| @@ -317,7 +319,10 @@ class SSLUITest : public InProcessBrowserTest { | 
| https_server_mismatched_(net::EmbeddedTestServer::TYPE_HTTPS), | 
| wss_server_expired_(net::SpawnedTestServer::TYPE_WSS, | 
| SSLOptions(SSLOptions::CERT_EXPIRED), | 
| - net::GetWebSocketTestDataDirectory()) { | 
| + net::GetWebSocketTestDataDirectory()), | 
| + wss_server_mismatched_(net::SpawnedTestServer::TYPE_WSS, | 
| + SSLOptions(SSLOptions::CERT_MISMATCHED_NAME), | 
| + net::GetWebSocketTestDataDirectory()) { | 
| https_server_.AddDefaultHandlers(base::FilePath(kDocRoot)); | 
| https_server_expired_.SetSSLConfig(net::EmbeddedTestServer::CERT_EXPIRED); | 
| @@ -631,6 +636,7 @@ class SSLUITest : public InProcessBrowserTest { | 
| net::EmbeddedTestServer https_server_expired_; | 
| net::EmbeddedTestServer https_server_mismatched_; | 
| net::SpawnedTestServer wss_server_expired_; | 
| + net::SpawnedTestServer wss_server_mismatched_; | 
| protected: | 
| // Navigates to an interstitial and clicks through the certificate | 
| @@ -689,6 +695,40 @@ class SSLUITestIgnoreCertErrors : public SSLUITest { | 
| } | 
| }; | 
| +static std::string MakeCertSPKIFingerprint(net::X509Certificate* cert) { | 
| + net::HashValue hash = GetSPKIHash(cert); | 
| + std::string hash_base64; | 
| + base::Base64Encode( | 
| + base::StringPiece(reinterpret_cast<const char*>(hash.data()), | 
| + hash.size()), | 
| + &hash_base64); | 
| + return hash_base64; | 
| +} | 
| + | 
| +class SSLUITestIgnoreCertErrorsBySPKIHTTPS : public SSLUITest { | 
| + protected: | 
| + void SetUpCommandLine(base::CommandLine* command_line) override { | 
| + std::string whitelist_flag = MakeCertSPKIFingerprint( | 
| + https_server_mismatched_.GetCertificate().get()); | 
| + command_line->AppendSwitchASCII(switches::kIgnoreCertificateErrorsSPKIList, | 
| + whitelist_flag); | 
| + } | 
| +}; | 
| + | 
| +class SSLUITestIgnoreCertErrorsBySPKIWSS : public SSLUITest { | 
| + public: | 
| + SSLUITestIgnoreCertErrorsBySPKIWSS() : SSLUITest() {} | 
| + | 
| + void SetUpCommandLine(base::CommandLine* command_line) override { | 
| + std::string whitelist_flag = | 
| + MakeCertSPKIFingerprint(wss_server_expired_.GetCertificate().get()); | 
| + // Browser will ignore certificate errors for chains matching one of the | 
| + // public keys from the list. | 
| 
 
estark
2017/05/17 18:04:18
optional nit: just for consistency, include this c
 
martinkr
2017/05/23 18:30:43
Done.
 
 | 
| + command_line->AppendSwitchASCII(switches::kIgnoreCertificateErrorsSPKIList, | 
| + whitelist_flag); | 
| + } | 
| +}; | 
| + | 
| class SSLUITestIgnoreLocalhostCertErrors : public SSLUITest { | 
| public: | 
| SSLUITestIgnoreLocalhostCertErrors() : SSLUITest() {} | 
| @@ -2664,6 +2704,52 @@ IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreCertErrors, TestWSS) { | 
| EXPECT_TRUE(base::LowerCaseEqualsASCII(result, "pass")); | 
| } | 
| +// Visit a page and establish a WebSocket connection over bad https with | 
| 
 
estark
2017/05/17 18:04:18
Question: are you testing WebSockets because they
 
martinkr
2017/05/23 18:30:43
I was actually just aping SSLUITestIgnoreCertError
 
 | 
| +// --disable-certificate-errors-spki-list. The connection should be established | 
| 
 
estark
2017/05/17 18:04:18
nit: s/disable/ignore? (same on line 2735)
 
martinkr
2017/05/23 18:30:43
Done.
 
 | 
| +// without interstitial page showing. | 
| +IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreCertErrorsBySPKIWSS, TestWSSExpired) { | 
| + ASSERT_TRUE(embedded_test_server()->Start()); | 
| 
 
estark
2017/05/17 18:04:19
Do you need this? Doesn't look like you use it unl
 
martinkr
2017/05/23 18:30:43
Done.
 
 | 
| + ASSERT_TRUE(wss_server_expired_.Start()); | 
| + | 
| + // Setup page title observer. | 
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); | 
| + content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS")); | 
| + watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL")); | 
| + | 
| + // Visit bad HTTPS page. | 
| + GURL::Replacements replacements; | 
| + replacements.SetSchemeStr("https"); | 
| + ui_test_utils::NavigateToURL(browser(), | 
| + wss_server_expired_.GetURL("connect_check.html") | 
| + .ReplaceComponents(replacements)); | 
| + | 
| + // We shouldn't have an interstitial page showing here. | 
| + | 
| + // Test page run a WebSocket wss connection test. The result will be shown | 
| + // as page title. | 
| + const base::string16 result = watcher.WaitAndGetTitle(); | 
| + EXPECT_TRUE(base::LowerCaseEqualsASCII(result, "pass")); | 
| +} | 
| + | 
| +// Test that HTTPS pages with a bad certificate don't show an interstitial if | 
| +// the public key matches a value from --disable-certificate-errors-spki-list. | 
| +IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreCertErrorsBySPKIHTTPS, TestHTTPS) { | 
| + ASSERT_TRUE(https_server_mismatched_.Start()); | 
| + | 
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); | 
| + | 
| + ui_test_utils::NavigateToURL( | 
| + browser(), | 
| + https_server_mismatched_.GetURL("/ssl/page_with_subresource.html")); | 
| + | 
| + // We should see no interstitial. The script tag in the page should have | 
| + // loaded and ran (and wasn't blocked by the certificate error). | 
| + CheckAuthenticatedState(tab, AuthState::NONE); | 
| + base::string16 title; | 
| + ui_test_utils::GetCurrentTabTitle(browser(), &title); | 
| + EXPECT_EQ(title, base::ASCIIToUTF16("This script has loaded")); | 
| +} | 
| + | 
| // Verifies that the interstitial can proceed, even if JavaScript is disabled. | 
| // http://crbug.com/322948 | 
| #if defined(OS_LINUX) |