| Index: chrome/browser/subresource_filter/subresource_filter_browsertest.cc
|
| diff --git a/chrome/browser/subresource_filter/subresource_filter_browsertest.cc b/chrome/browser/subresource_filter/subresource_filter_browsertest.cc
|
| index 9aa2ddb77d7944964cc57c1930c8df379610699c..416ebd04d4fb2a3b35fbad880c026cf0e9c07e92 100644
|
| --- a/chrome/browser/subresource_filter/subresource_filter_browsertest.cc
|
| +++ b/chrome/browser/subresource_filter/subresource_filter_browsertest.cc
|
| @@ -20,6 +20,7 @@
|
| #include "base/test/histogram_tester.h"
|
| #include "chrome/browser/browser_process.h"
|
| #include "chrome/browser/content_settings/host_content_settings_map_factory.h"
|
| +#include "chrome/browser/content_settings/tab_specific_content_settings.h"
|
| #include "chrome/browser/metrics/subprocess_metrics_provider.h"
|
| #include "chrome/browser/page_load_metrics/observers/subresource_filter_metrics_observer.h"
|
| #include "chrome/browser/safe_browsing/test_safe_browsing_service.h"
|
| @@ -881,6 +882,44 @@ IN_PROC_BROWSER_TEST_F(SubresourceFilterBrowserTest,
|
| std::vector<const char*>{"b", "d"}, {false, true});
|
| }
|
|
|
| +IN_PROC_BROWSER_TEST_F(SubresourceFilterBrowserTest, BlockCreatingNewWindows) {
|
| + base::HistogramTester tester;
|
| + const char kWindowOpenPath[] = "/subresource_filter/window_open.html";
|
| + GURL a_url(embedded_test_server()->GetURL("a.com", kWindowOpenPath));
|
| + GURL b_url(embedded_test_server()->GetURL("b.com", kWindowOpenPath));
|
| + // Only configure |a_url| as a phishing URL.
|
| + ConfigureAsPhishingURL(a_url);
|
| +
|
| + // Only necessary so we have a valid ruleset.
|
| + ASSERT_NO_FATAL_FAILURE(SetRulesetWithRules(std::vector<proto::UrlRule>()));
|
| +
|
| + // Navigate to a_url, should trigger the popup blocker.
|
| + ui_test_utils::NavigateToURL(browser(), a_url);
|
| + bool opened_window = false;
|
| + content::WebContents* web_contents =
|
| + browser()->tab_strip_model()->GetActiveWebContents();
|
| + EXPECT_TRUE(content::ExecuteScriptAndExtractBool(web_contents, "openWindow()",
|
| + &opened_window));
|
| + EXPECT_FALSE(opened_window);
|
| + // Do not force the UI if the popup was the only thing disallowed. The popup
|
| + // UI is good enough.
|
| + tester.ExpectBucketCount(kSubresourceFilterActionsHistogram, kActionUIShown,
|
| + 0);
|
| + // Make sure the popup UI was shown.
|
| + EXPECT_TRUE(TabSpecificContentSettings::FromWebContents(web_contents)
|
| + ->IsContentBlocked(CONTENT_SETTINGS_TYPE_POPUPS));
|
| +
|
| + // Navigate to |b_url|, which should successfully open the popup.
|
| + ui_test_utils::NavigateToURL(browser(), b_url);
|
| + opened_window = false;
|
| + EXPECT_TRUE(content::ExecuteScriptAndExtractBool(web_contents, "openWindow()",
|
| + &opened_window));
|
| + EXPECT_TRUE(opened_window);
|
| + // Popup UI should not be shown.
|
| + EXPECT_FALSE(TabSpecificContentSettings::FromWebContents(web_contents)
|
| + ->IsContentBlocked(CONTENT_SETTINGS_TYPE_POPUPS));
|
| +}
|
| +
|
| IN_PROC_BROWSER_TEST_F(SubresourceFilterBrowserTest,
|
| ContentSettingsWhitelist_DoNotActivate) {
|
| ASSERT_NO_FATAL_FAILURE(
|
|
|