Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(4498)

Unified Diff: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc

Issue 512073002: Cleanup of SafeBrowsingBlockingPageBrowserTest tests (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
index 0b45f4deab913be1135ad3619641207587fc9fb4..17f2506e7bd5db538b9af38c71e9c39a9061babb 100644
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc
@@ -59,12 +59,10 @@ class InterstitialObserver : public content::WebContentsObserver {
}
virtual void DidAttachInterstitialPage() OVERRIDE {
- LOG(INFO) << __FUNCTION__;
attach_callback_.Run();
}
virtual void DidDetachInterstitialPage() OVERRIDE {
- LOG(INFO) << __FUNCTION__;
detach_callback_.Run();
}
@@ -255,13 +253,11 @@ class FakeMalwareDetails : public MalwareDetails {
void WaitForDOM() {
if (got_dom_) {
- LOG(INFO) << "Already got the dom details.";
return;
}
// This condition might not trigger normally, but if you add a
// sleep(1) in malware_dom_details it triggers :).
waiting_ = true;
- LOG(INFO) << "Waiting for dom details.";
content::RunMessageLoop();
EXPECT_TRUE(got_dom_);
}
@@ -317,7 +313,6 @@ class TestSafeBrowsingBlockingPage : public SafeBrowsingBlockingPage {
}
virtual ~TestSafeBrowsingBlockingPage() {
- LOG(INFO) << __FUNCTION__;
if (!wait_for_delete_)
return;
@@ -327,22 +322,18 @@ class TestSafeBrowsingBlockingPage : public SafeBrowsingBlockingPage {
}
void WaitForDelete() {
- LOG(INFO) << __FUNCTION__;
wait_for_delete_ = true;
content::RunMessageLoop();
}
// InterstitialPageDelegate methods:
virtual void CommandReceived(const std::string& command) OVERRIDE {
- LOG(INFO) << __FUNCTION__ << " " << command;
SafeBrowsingBlockingPage::CommandReceived(command);
}
virtual void OnProceed() OVERRIDE {
- LOG(INFO) << __FUNCTION__;
SafeBrowsingBlockingPage::OnProceed();
}
virtual void OnDontProceed() OVERRIDE {
- LOG(INFO) << __FUNCTION__;
SafeBrowsingBlockingPage::OnDontProceed();
}
@@ -428,7 +419,6 @@ class SafeBrowsingBlockingPageBrowserTest
GURL iframe_url = test_server()->GetURL(kMalwareIframe);
SetURLThreatType(iframe_url, SB_THREAT_TYPE_URL_MALWARE);
- LOG(INFO) << "navigating... " << url.spec();
ui_test_utils::NavigateToURL(browser(), url);
EXPECT_TRUE(WaitForReady());
return url;
@@ -506,14 +496,12 @@ class SafeBrowsingBlockingPageBrowserTest
}
void SetReportSentCallback(const base::Closure& callback) {
- LOG(INFO) << __FUNCTION__;
factory_.most_recent_service()
->fake_ui_manager()
->set_malware_details_done_callback(callback);
}
std::string GetReportSent() {
- LOG(INFO) << __FUNCTION__;
return factory_.most_recent_service()->fake_ui_manager()->GetReport();
}
@@ -558,7 +546,6 @@ class SafeBrowsingBlockingPageBrowserTest
}
bool WaitForReady() {
- LOG(INFO) << __FUNCTION__;
content::RenderViewHost* rvh = GetRenderViewHost();
if (!rvh)
return false;
@@ -572,7 +559,6 @@ class SafeBrowsingBlockingPageBrowserTest
if (!value.get() || !value->GetAsString(&ready_state))
return false;
} while (ready_state != "complete");
- LOG(INFO) << "done waiting";
return true;
}
@@ -596,7 +582,6 @@ class SafeBrowsingBlockingPageBrowserTest
}
bool Click(const std::string& node_id) {
- LOG(INFO) << "Click " << node_id;
content::RenderViewHost* rvh = GetRenderViewHost();
if (!rvh)
return false;
@@ -731,36 +716,25 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
browser()->tab_strip_model()->GetActiveWebContents()->GetURL());
}
-// TODO(felt): Needs to be re-enabled: http://crbug.com/273302
IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
- DISABLED_MalwareIframeReportDetails) {
+ MalwareIframeReportDetails) {
scoped_refptr<content::MessageLoopRunner> malware_report_sent_runner(
new content::MessageLoopRunner);
SetReportSentCallback(malware_report_sent_runner->QuitClosure());
GURL url = SetupMalwareIframeWarningAndNavigate();
- LOG(INFO) << "1";
-
// If the DOM details from renderer did not already return, wait for them.
details_factory_.get_details()->WaitForDOM();
- LOG(INFO) << "2";
-
- EXPECT_TRUE(Click("check-report"));
- LOG(INFO) << "3";
- EXPECT_TRUE(ClickAndWaitForDetach("proceed"));
- LOG(INFO) << "4";
+ EXPECT_TRUE(Click("opt-in-checkbox"));
+ EXPECT_TRUE(ClickAndWaitForDetach("proceed-link"));
AssertNoInterstitial(true); // Assert the interstitial is gone
- LOG(INFO) << "5";
ASSERT_TRUE(browser()->profile()->GetPrefs()->GetBoolean(
prefs::kSafeBrowsingExtendedReportingEnabled));
- LOG(INFO) << "6";
-
EXPECT_EQ(url,
browser()->tab_strip_model()->GetActiveWebContents()->GetURL());
- LOG(INFO) << "7";
malware_report_sent_runner->Run();
std::string serialized = GetReportSent();
@@ -768,7 +742,6 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
ASSERT_TRUE(report.ParseFromString(serialized));
// Verify the report is complete.
EXPECT_TRUE(report.complete());
- LOG(INFO) << "8";
}
// Verifies that the "proceed anyway" link isn't available when it is disabled
@@ -802,12 +775,11 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, ProceedDisabled) {
browser()->tab_strip_model()->GetActiveWebContents()->GetURL());
}
-// TODO(felt): Needs to be re-enabled: http://crbug.com/273302
// Verifies that the reporting checkbox is hidden on non-HTTP pages.
// TODO(mattm): Should also verify that no report is sent, but there isn't a
// good way to do that in the current design.
IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
- DISABLED_ReportingDisabled) {
+ ReportingDisabled) {
#if defined(OS_WIN) && defined(USE_ASH)
// Disable this test in Metro+Ash for now (http://crbug.com/262796).
if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kAshBrowserTests))
@@ -826,14 +798,14 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
ui_test_utils::NavigateToURL(browser(), url);
ASSERT_TRUE(WaitForReady());
- EXPECT_EQ(HIDDEN, GetVisibility("check-report"));
- EXPECT_EQ(HIDDEN, GetVisibility("show-diagnostic-link"));
- EXPECT_EQ(HIDDEN, GetVisibility("proceed"));
- EXPECT_TRUE(Click("see-more-link"));
- EXPECT_EQ(VISIBLE, GetVisibility("show-diagnostic-link"));
- EXPECT_EQ(VISIBLE, GetVisibility("proceed"));
+ EXPECT_EQ(HIDDEN, GetVisibility("malware-opt-in"));
+ EXPECT_EQ(HIDDEN, GetVisibility("opt-in-checkbox"));
+ EXPECT_EQ(HIDDEN, GetVisibility("proceed-link"));
+ EXPECT_TRUE(Click("details-button"));
+ EXPECT_EQ(VISIBLE, GetVisibility("help-link"));
+ EXPECT_EQ(VISIBLE, GetVisibility("proceed-link"));
- EXPECT_TRUE(ClickAndWaitForDetach("back"));
+ EXPECT_TRUE(ClickAndWaitForDetach("primary-button"));
AssertNoInterstitial(false); // Assert the interstitial is gone
EXPECT_EQ(GURL(url::kAboutBlankURL), // Back to "about:blank"
browser()->tab_strip_model()->GetActiveWebContents()->GetURL());
@@ -864,48 +836,21 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
browser()->tab_strip_model()->GetActiveWebContents()->GetURL());
}
-// http://crbug.com/247763
-#if defined(OS_WIN)
-// Temporarily re-enabled to get some logs.
-#define MAYBE_PhishingProceed PhishingProceed
-#else
-#define MAYBE_PhishingProceed PhishingProceed
-#endif
-IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
- MAYBE_PhishingProceed) {
+IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, PhishingProceed) {
GURL url = SetupWarningAndNavigate(SB_THREAT_TYPE_URL_PHISHING);
- LOG(INFO) << "1";
-
EXPECT_TRUE(ClickAndWaitForDetach("proceed-link"));
- LOG(INFO) << "2";
AssertNoInterstitial(true); // Assert the interstitial is gone
- LOG(INFO) << "3";
EXPECT_EQ(url,
browser()->tab_strip_model()->GetActiveWebContents()->GetURL());
- LOG(INFO) << "4";
}
-// See crbug.com/248447
-#if defined(OS_WIN)
-// Temporarily re-enabled to get some logs.
-#define MAYBE_PhishingLearnMore PhishingLearnMore
-#else
-#define MAYBE_PhishingLearnMore PhishingLearnMore
-#endif
-
-IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest,
- MAYBE_PhishingLearnMore) {
+IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, PhishingLearnMore) {
SetupWarningAndNavigate(SB_THREAT_TYPE_URL_PHISHING);
- LOG(INFO) << "1";
-
EXPECT_TRUE(ClickAndWaitForDetach("help-link"));
- LOG(INFO) << "2";
AssertNoInterstitial(false); // Assert the interstitial is gone
- LOG(INFO) << "3";
// We are in the help page.
EXPECT_EQ(
"/transparencyreport/safebrowsing/",
browser()->tab_strip_model()->GetActiveWebContents()->GetURL().path());
- LOG(INFO) << "4";
}
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698