Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
index 0b45f4deab913be1135ad3619641207587fc9fb4..17f2506e7bd5db538b9af38c71e9c39a9061babb 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
@@ -59,12 +59,10 @@ class InterstitialObserver : public content::WebContentsObserver { |
} |
virtual void DidAttachInterstitialPage() OVERRIDE { |
- LOG(INFO) << __FUNCTION__; |
attach_callback_.Run(); |
} |
virtual void DidDetachInterstitialPage() OVERRIDE { |
- LOG(INFO) << __FUNCTION__; |
detach_callback_.Run(); |
} |
@@ -255,13 +253,11 @@ class FakeMalwareDetails : public MalwareDetails { |
void WaitForDOM() { |
if (got_dom_) { |
- LOG(INFO) << "Already got the dom details."; |
return; |
} |
// This condition might not trigger normally, but if you add a |
// sleep(1) in malware_dom_details it triggers :). |
waiting_ = true; |
- LOG(INFO) << "Waiting for dom details."; |
content::RunMessageLoop(); |
EXPECT_TRUE(got_dom_); |
} |
@@ -317,7 +313,6 @@ class TestSafeBrowsingBlockingPage : public SafeBrowsingBlockingPage { |
} |
virtual ~TestSafeBrowsingBlockingPage() { |
- LOG(INFO) << __FUNCTION__; |
if (!wait_for_delete_) |
return; |
@@ -327,22 +322,18 @@ class TestSafeBrowsingBlockingPage : public SafeBrowsingBlockingPage { |
} |
void WaitForDelete() { |
- LOG(INFO) << __FUNCTION__; |
wait_for_delete_ = true; |
content::RunMessageLoop(); |
} |
// InterstitialPageDelegate methods: |
virtual void CommandReceived(const std::string& command) OVERRIDE { |
- LOG(INFO) << __FUNCTION__ << " " << command; |
SafeBrowsingBlockingPage::CommandReceived(command); |
} |
virtual void OnProceed() OVERRIDE { |
- LOG(INFO) << __FUNCTION__; |
SafeBrowsingBlockingPage::OnProceed(); |
} |
virtual void OnDontProceed() OVERRIDE { |
- LOG(INFO) << __FUNCTION__; |
SafeBrowsingBlockingPage::OnDontProceed(); |
} |
@@ -428,7 +419,6 @@ class SafeBrowsingBlockingPageBrowserTest |
GURL iframe_url = test_server()->GetURL(kMalwareIframe); |
SetURLThreatType(iframe_url, SB_THREAT_TYPE_URL_MALWARE); |
- LOG(INFO) << "navigating... " << url.spec(); |
ui_test_utils::NavigateToURL(browser(), url); |
EXPECT_TRUE(WaitForReady()); |
return url; |
@@ -506,14 +496,12 @@ class SafeBrowsingBlockingPageBrowserTest |
} |
void SetReportSentCallback(const base::Closure& callback) { |
- LOG(INFO) << __FUNCTION__; |
factory_.most_recent_service() |
->fake_ui_manager() |
->set_malware_details_done_callback(callback); |
} |
std::string GetReportSent() { |
- LOG(INFO) << __FUNCTION__; |
return factory_.most_recent_service()->fake_ui_manager()->GetReport(); |
} |
@@ -558,7 +546,6 @@ class SafeBrowsingBlockingPageBrowserTest |
} |
bool WaitForReady() { |
- LOG(INFO) << __FUNCTION__; |
content::RenderViewHost* rvh = GetRenderViewHost(); |
if (!rvh) |
return false; |
@@ -572,7 +559,6 @@ class SafeBrowsingBlockingPageBrowserTest |
if (!value.get() || !value->GetAsString(&ready_state)) |
return false; |
} while (ready_state != "complete"); |
- LOG(INFO) << "done waiting"; |
return true; |
} |
@@ -596,7 +582,6 @@ class SafeBrowsingBlockingPageBrowserTest |
} |
bool Click(const std::string& node_id) { |
- LOG(INFO) << "Click " << node_id; |
content::RenderViewHost* rvh = GetRenderViewHost(); |
if (!rvh) |
return false; |
@@ -731,36 +716,25 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
browser()->tab_strip_model()->GetActiveWebContents()->GetURL()); |
} |
-// TODO(felt): Needs to be re-enabled: http://crbug.com/273302 |
IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
- DISABLED_MalwareIframeReportDetails) { |
+ MalwareIframeReportDetails) { |
scoped_refptr<content::MessageLoopRunner> malware_report_sent_runner( |
new content::MessageLoopRunner); |
SetReportSentCallback(malware_report_sent_runner->QuitClosure()); |
GURL url = SetupMalwareIframeWarningAndNavigate(); |
- LOG(INFO) << "1"; |
- |
// If the DOM details from renderer did not already return, wait for them. |
details_factory_.get_details()->WaitForDOM(); |
- LOG(INFO) << "2"; |
- |
- EXPECT_TRUE(Click("check-report")); |
- LOG(INFO) << "3"; |
- EXPECT_TRUE(ClickAndWaitForDetach("proceed")); |
- LOG(INFO) << "4"; |
+ EXPECT_TRUE(Click("opt-in-checkbox")); |
+ EXPECT_TRUE(ClickAndWaitForDetach("proceed-link")); |
AssertNoInterstitial(true); // Assert the interstitial is gone |
- LOG(INFO) << "5"; |
ASSERT_TRUE(browser()->profile()->GetPrefs()->GetBoolean( |
prefs::kSafeBrowsingExtendedReportingEnabled)); |
- LOG(INFO) << "6"; |
- |
EXPECT_EQ(url, |
browser()->tab_strip_model()->GetActiveWebContents()->GetURL()); |
- LOG(INFO) << "7"; |
malware_report_sent_runner->Run(); |
std::string serialized = GetReportSent(); |
@@ -768,7 +742,6 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
ASSERT_TRUE(report.ParseFromString(serialized)); |
// Verify the report is complete. |
EXPECT_TRUE(report.complete()); |
- LOG(INFO) << "8"; |
} |
// Verifies that the "proceed anyway" link isn't available when it is disabled |
@@ -802,12 +775,11 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, ProceedDisabled) { |
browser()->tab_strip_model()->GetActiveWebContents()->GetURL()); |
} |
-// TODO(felt): Needs to be re-enabled: http://crbug.com/273302 |
// Verifies that the reporting checkbox is hidden on non-HTTP pages. |
// TODO(mattm): Should also verify that no report is sent, but there isn't a |
// good way to do that in the current design. |
IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
- DISABLED_ReportingDisabled) { |
+ ReportingDisabled) { |
#if defined(OS_WIN) && defined(USE_ASH) |
// Disable this test in Metro+Ash for now (http://crbug.com/262796). |
if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kAshBrowserTests)) |
@@ -826,14 +798,14 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
ui_test_utils::NavigateToURL(browser(), url); |
ASSERT_TRUE(WaitForReady()); |
- EXPECT_EQ(HIDDEN, GetVisibility("check-report")); |
- EXPECT_EQ(HIDDEN, GetVisibility("show-diagnostic-link")); |
- EXPECT_EQ(HIDDEN, GetVisibility("proceed")); |
- EXPECT_TRUE(Click("see-more-link")); |
- EXPECT_EQ(VISIBLE, GetVisibility("show-diagnostic-link")); |
- EXPECT_EQ(VISIBLE, GetVisibility("proceed")); |
+ EXPECT_EQ(HIDDEN, GetVisibility("malware-opt-in")); |
+ EXPECT_EQ(HIDDEN, GetVisibility("opt-in-checkbox")); |
+ EXPECT_EQ(HIDDEN, GetVisibility("proceed-link")); |
+ EXPECT_TRUE(Click("details-button")); |
+ EXPECT_EQ(VISIBLE, GetVisibility("help-link")); |
+ EXPECT_EQ(VISIBLE, GetVisibility("proceed-link")); |
- EXPECT_TRUE(ClickAndWaitForDetach("back")); |
+ EXPECT_TRUE(ClickAndWaitForDetach("primary-button")); |
AssertNoInterstitial(false); // Assert the interstitial is gone |
EXPECT_EQ(GURL(url::kAboutBlankURL), // Back to "about:blank" |
browser()->tab_strip_model()->GetActiveWebContents()->GetURL()); |
@@ -864,48 +836,21 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
browser()->tab_strip_model()->GetActiveWebContents()->GetURL()); |
} |
-// http://crbug.com/247763 |
-#if defined(OS_WIN) |
-// Temporarily re-enabled to get some logs. |
-#define MAYBE_PhishingProceed PhishingProceed |
-#else |
-#define MAYBE_PhishingProceed PhishingProceed |
-#endif |
-IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
- MAYBE_PhishingProceed) { |
+IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, PhishingProceed) { |
GURL url = SetupWarningAndNavigate(SB_THREAT_TYPE_URL_PHISHING); |
- LOG(INFO) << "1"; |
- |
EXPECT_TRUE(ClickAndWaitForDetach("proceed-link")); |
- LOG(INFO) << "2"; |
AssertNoInterstitial(true); // Assert the interstitial is gone |
- LOG(INFO) << "3"; |
EXPECT_EQ(url, |
browser()->tab_strip_model()->GetActiveWebContents()->GetURL()); |
- LOG(INFO) << "4"; |
} |
-// See crbug.com/248447 |
-#if defined(OS_WIN) |
-// Temporarily re-enabled to get some logs. |
-#define MAYBE_PhishingLearnMore PhishingLearnMore |
-#else |
-#define MAYBE_PhishingLearnMore PhishingLearnMore |
-#endif |
- |
-IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, |
- MAYBE_PhishingLearnMore) { |
+IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageBrowserTest, PhishingLearnMore) { |
SetupWarningAndNavigate(SB_THREAT_TYPE_URL_PHISHING); |
- LOG(INFO) << "1"; |
- |
EXPECT_TRUE(ClickAndWaitForDetach("help-link")); |
- LOG(INFO) << "2"; |
AssertNoInterstitial(false); // Assert the interstitial is gone |
- LOG(INFO) << "3"; |
// We are in the help page. |
EXPECT_EQ( |
"/transparencyreport/safebrowsing/", |
browser()->tab_strip_model()->GetActiveWebContents()->GetURL().path()); |
- LOG(INFO) << "4"; |
} |