Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(527)

Unified Diff: chrome/browser/policy/policy_browsertest.cc

Issue 551323003: Fixed flakiness in PolicyTest.FileURLBlacklist. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: assert_ Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/policy/policy_browsertest.cc
diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc
index c7502c792a6b4c5a49d57033e257c413f390c511..eff4c9944e0ad56eab245d21ab1b24024acd3966 100644
--- a/chrome/browser/policy/policy_browsertest.cc
+++ b/chrome/browser/policy/policy_browsertest.cc
@@ -294,11 +294,11 @@ void CheckCanOpenURL(Browser* browser, const char* spec) {
ui_test_utils::NavigateToURL(browser, url);
content::WebContents* contents =
browser->tab_strip_model()->GetActiveWebContents();
- EXPECT_EQ(url, contents->GetURL());
+ ASSERT_EQ(url, contents->GetURL());
base::string16 spec16 = base::UTF8ToUTF16(url.spec());
base::string16 title =
l10n_util::GetStringFUTF16(IDS_ERRORPAGES_TITLE_BLOCKED, spec16);
- EXPECT_NE(title, contents->GetTitle());
+ ASSERT_NE(title, contents->GetTitle());
}
// Verifies that access to the given url |spec| is blocked.
@@ -307,21 +307,21 @@ void CheckURLIsBlocked(Browser* browser, const char* spec) {
ui_test_utils::NavigateToURL(browser, url);
content::WebContents* contents =
browser->tab_strip_model()->GetActiveWebContents();
- EXPECT_EQ(url, contents->GetURL());
+ ASSERT_EQ(url, contents->GetURL());
base::string16 spec16 = base::UTF8ToUTF16(url.spec());
base::string16 title =
l10n_util::GetStringFUTF16(IDS_ERRORPAGES_TITLE_BLOCKED, spec16);
- EXPECT_EQ(title, contents->GetTitle());
+ ASSERT_EQ(title, contents->GetTitle());
// Verify that the expected error page is being displayed.
bool result = false;
- EXPECT_TRUE(content::ExecuteScriptAndExtractBool(
+ ASSERT_TRUE(content::ExecuteScriptAndExtractBool(
contents,
"var textContent = document.body.textContent;"
"var hasError = textContent.indexOf('ERR_BLOCKED_BY_ADMINISTRATOR') >= 0;"
"domAutomationController.send(hasError);",
&result));
- EXPECT_TRUE(result);
+ ASSERT_TRUE(result);
}
// Downloads a file named |file| and expects it to be saved to |dir|, which
@@ -2099,7 +2099,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
}
// Verify that "bbb.com" opens before applying the blacklist.
- CheckCanOpenURL(browser(), kURLS[1]);
+ EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[1]));
// Set a blacklist.
base::ListValue blacklist;
@@ -2110,9 +2110,10 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
UpdateProviderPolicy(policies);
FlushBlacklistPolicy();
// All bbb.com URLs are blocked, and "aaa.com" is still unblocked.
- CheckCanOpenURL(browser(), kURLS[0]);
- for (size_t i = 1; i < arraysize(kURLS); ++i)
- CheckURLIsBlocked(browser(), kURLS[i]);
+ EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[0]));
+ for (size_t i = 1; i < arraysize(kURLS); ++i) {
+ EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), kURLS[i]));
+ }
// Whitelist some sites of bbb.com.
base::ListValue whitelist;
@@ -2122,9 +2123,9 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
POLICY_SCOPE_USER, whitelist.DeepCopy(), NULL);
UpdateProviderPolicy(policies);
FlushBlacklistPolicy();
- CheckURLIsBlocked(browser(), kURLS[1]);
- CheckCanOpenURL(browser(), kURLS[2]);
- CheckCanOpenURL(browser(), kURLS[3]);
+ EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), kURLS[1]));
+ EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[2]));
+ EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[3]));
{
base::RunLoop loop;
@@ -2136,13 +2137,7 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, URLBlacklist) {
}
}
-#if defined(OS_MACOSX)
-// http://crbug.com/339240
-#define MAYBE_FileURLBlacklist DISABLED_FileURLBlacklist
-#else
-#define MAYBE_FileURLBlacklist FileURLBlacklist
-#endif
-IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
+IN_PROC_BROWSER_TEST_F(PolicyTest, FileURLBlacklist) {
// Check that FileURLs can be blacklisted and DisabledSchemes works together
// with URLblacklisting and URLwhitelisting.
@@ -2153,8 +2148,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
const std::string file_path1 = base_path + "title1.html";
const std::string file_path2 = folder_path + "basic.html";
- CheckCanOpenURL(browser(), file_path1.c_str());
- CheckCanOpenURL(browser(), file_path2.c_str());
+ EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), file_path1.c_str()));
+ EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), file_path2.c_str()));
// Set a blacklist for all the files.
base::ListValue blacklist;
@@ -2165,8 +2160,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
UpdateProviderPolicy(policies);
FlushBlacklistPolicy();
- CheckURLIsBlocked(browser(), file_path1.c_str());
- CheckURLIsBlocked(browser(), file_path2.c_str());
+ EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), file_path1.c_str()));
+ EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), file_path2.c_str()));
// Replace the URLblacklist with disabling the file scheme.
blacklist.Remove(base::StringValue("file://*"), NULL);
@@ -2202,8 +2197,8 @@ IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) {
UpdateProviderPolicy(policies);
FlushBlacklistPolicy();
- CheckCanOpenURL(browser(), file_path1.c_str());
- CheckURLIsBlocked(browser(), file_path2.c_str());
+ EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), file_path1.c_str()));
+ EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), file_path2.c_str()));
}
#if !defined(OS_MACOSX)
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698