Index: chrome/browser/policy/policy_browsertest.cc |
diff --git a/chrome/browser/policy/policy_browsertest.cc b/chrome/browser/policy/policy_browsertest.cc |
index eff4c9944e0ad56eab245d21ab1b24024acd3966..c7502c792a6b4c5a49d57033e257c413f390c511 100644 |
--- a/chrome/browser/policy/policy_browsertest.cc |
+++ b/chrome/browser/policy/policy_browsertest.cc |
@@ -294,11 +294,11 @@ |
ui_test_utils::NavigateToURL(browser, url); |
content::WebContents* contents = |
browser->tab_strip_model()->GetActiveWebContents(); |
- ASSERT_EQ(url, contents->GetURL()); |
+ EXPECT_EQ(url, contents->GetURL()); |
base::string16 spec16 = base::UTF8ToUTF16(url.spec()); |
base::string16 title = |
l10n_util::GetStringFUTF16(IDS_ERRORPAGES_TITLE_BLOCKED, spec16); |
- ASSERT_NE(title, contents->GetTitle()); |
+ EXPECT_NE(title, contents->GetTitle()); |
} |
// Verifies that access to the given url |spec| is blocked. |
@@ -307,21 +307,21 @@ |
ui_test_utils::NavigateToURL(browser, url); |
content::WebContents* contents = |
browser->tab_strip_model()->GetActiveWebContents(); |
- ASSERT_EQ(url, contents->GetURL()); |
+ EXPECT_EQ(url, contents->GetURL()); |
base::string16 spec16 = base::UTF8ToUTF16(url.spec()); |
base::string16 title = |
l10n_util::GetStringFUTF16(IDS_ERRORPAGES_TITLE_BLOCKED, spec16); |
- ASSERT_EQ(title, contents->GetTitle()); |
+ EXPECT_EQ(title, contents->GetTitle()); |
// Verify that the expected error page is being displayed. |
bool result = false; |
- ASSERT_TRUE(content::ExecuteScriptAndExtractBool( |
+ EXPECT_TRUE(content::ExecuteScriptAndExtractBool( |
contents, |
"var textContent = document.body.textContent;" |
"var hasError = textContent.indexOf('ERR_BLOCKED_BY_ADMINISTRATOR') >= 0;" |
"domAutomationController.send(hasError);", |
&result)); |
- ASSERT_TRUE(result); |
+ EXPECT_TRUE(result); |
} |
// Downloads a file named |file| and expects it to be saved to |dir|, which |
@@ -2099,7 +2099,7 @@ |
} |
// Verify that "bbb.com" opens before applying the blacklist. |
- EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[1])); |
+ CheckCanOpenURL(browser(), kURLS[1]); |
// Set a blacklist. |
base::ListValue blacklist; |
@@ -2110,10 +2110,9 @@ |
UpdateProviderPolicy(policies); |
FlushBlacklistPolicy(); |
// All bbb.com URLs are blocked, and "aaa.com" is still unblocked. |
- EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[0])); |
- for (size_t i = 1; i < arraysize(kURLS); ++i) { |
- EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), kURLS[i])); |
- } |
+ CheckCanOpenURL(browser(), kURLS[0]); |
+ for (size_t i = 1; i < arraysize(kURLS); ++i) |
+ CheckURLIsBlocked(browser(), kURLS[i]); |
// Whitelist some sites of bbb.com. |
base::ListValue whitelist; |
@@ -2123,9 +2122,9 @@ |
POLICY_SCOPE_USER, whitelist.DeepCopy(), NULL); |
UpdateProviderPolicy(policies); |
FlushBlacklistPolicy(); |
- EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), kURLS[1])); |
- EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[2])); |
- EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), kURLS[3])); |
+ CheckURLIsBlocked(browser(), kURLS[1]); |
+ CheckCanOpenURL(browser(), kURLS[2]); |
+ CheckCanOpenURL(browser(), kURLS[3]); |
{ |
base::RunLoop loop; |
@@ -2137,7 +2136,13 @@ |
} |
} |
-IN_PROC_BROWSER_TEST_F(PolicyTest, FileURLBlacklist) { |
+#if defined(OS_MACOSX) |
+// http://crbug.com/339240 |
+#define MAYBE_FileURLBlacklist DISABLED_FileURLBlacklist |
+#else |
+#define MAYBE_FileURLBlacklist FileURLBlacklist |
+#endif |
+IN_PROC_BROWSER_TEST_F(PolicyTest, MAYBE_FileURLBlacklist) { |
// Check that FileURLs can be blacklisted and DisabledSchemes works together |
// with URLblacklisting and URLwhitelisting. |
@@ -2148,8 +2153,8 @@ |
const std::string file_path1 = base_path + "title1.html"; |
const std::string file_path2 = folder_path + "basic.html"; |
- EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), file_path1.c_str())); |
- EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), file_path2.c_str())); |
+ CheckCanOpenURL(browser(), file_path1.c_str()); |
+ CheckCanOpenURL(browser(), file_path2.c_str()); |
// Set a blacklist for all the files. |
base::ListValue blacklist; |
@@ -2160,8 +2165,8 @@ |
UpdateProviderPolicy(policies); |
FlushBlacklistPolicy(); |
- EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), file_path1.c_str())); |
- EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), file_path2.c_str())); |
+ CheckURLIsBlocked(browser(), file_path1.c_str()); |
+ CheckURLIsBlocked(browser(), file_path2.c_str()); |
// Replace the URLblacklist with disabling the file scheme. |
blacklist.Remove(base::StringValue("file://*"), NULL); |
@@ -2197,8 +2202,8 @@ |
UpdateProviderPolicy(policies); |
FlushBlacklistPolicy(); |
- EXPECT_NO_FATAL_FAILURE(CheckCanOpenURL(browser(), file_path1.c_str())); |
- EXPECT_NO_FATAL_FAILURE(CheckURLIsBlocked(browser(), file_path2.c_str())); |
+ CheckCanOpenURL(browser(), file_path1.c_str()); |
+ CheckURLIsBlocked(browser(), file_path2.c_str()); |
} |
#if !defined(OS_MACOSX) |