Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(633)

Side by Side Diff: chrome/browser/ssl/ssl_browser_tests.cc

Issue 9414024: Fix flaky SSLUI tests (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Addressed Comments Created 8 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/command_line.h" 5 #include "base/command_line.h"
6 #include "base/time.h" 6 #include "base/time.h"
7 #include "chrome/app/chrome_command_ids.h" 7 #include "chrome/app/chrome_command_ids.h"
8 #include "chrome/browser/tabs/tab_strip_model.h" 8 #include "chrome/browser/tabs/tab_strip_model.h"
9 #include "chrome/browser/ui/browser.h" 9 #include "chrome/browser/ui/browser.h"
10 #include "chrome/browser/ui/browser_navigator.h" 10 #include "chrome/browser/ui/browser_navigator.h"
(...skipping 80 matching lines...) Expand 10 before | Expand all | Expand 10 after
91 NavigationEntry* entry = tab->GetController().GetActiveEntry(); 91 NavigationEntry* entry = tab->GetController().GetActiveEntry();
92 ASSERT_TRUE(entry); 92 ASSERT_TRUE(entry);
93 EXPECT_EQ(interstitial ? 93 EXPECT_EQ(interstitial ?
94 content::PAGE_TYPE_INTERSTITIAL : content::PAGE_TYPE_NORMAL, 94 content::PAGE_TYPE_INTERSTITIAL : content::PAGE_TYPE_NORMAL,
95 entry->GetPageType()); 95 entry->GetPageType());
96 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN, 96 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN,
97 entry->GetSSL().security_style); 97 entry->GetSSL().security_style);
98 // CERT_STATUS_UNABLE_TO_CHECK_REVOCATION doesn't lower the security style 98 // CERT_STATUS_UNABLE_TO_CHECK_REVOCATION doesn't lower the security style
99 // to SECURITY_STYLE_AUTHENTICATION_BROKEN. 99 // to SECURITY_STYLE_AUTHENTICATION_BROKEN.
100 ASSERT_NE(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION, error); 100 ASSERT_NE(net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION, error);
101 EXPECT_EQ(error, 101 EXPECT_EQ(error, entry->GetSSL().cert_status & error);
102 entry->GetSSL().cert_status & net::CERT_STATUS_ALL_ERRORS);
103 EXPECT_FALSE(!!(entry->GetSSL().content_status & 102 EXPECT_FALSE(!!(entry->GetSSL().content_status &
104 SSLStatus::DISPLAYED_INSECURE_CONTENT)); 103 SSLStatus::DISPLAYED_INSECURE_CONTENT));
105 EXPECT_EQ(ran_insecure_content, 104 EXPECT_EQ(ran_insecure_content,
106 !!(entry->GetSSL().content_status & SSLStatus::RAN_INSECURE_CONTENT)); 105 !!(entry->GetSSL().content_status & SSLStatus::RAN_INSECURE_CONTENT));
106 net::CertStatus extra_cert_errors = error ^ (entry->GetSSL().cert_status &
107 net::CERT_STATUS_ALL_ERRORS);
108 if (extra_cert_errors)
109 LOG(WARNING) << "Got unexpected cert error: " << extra_cert_errors;
107 } 110 }
108 111
109 void CheckWorkerLoadResult(WebContents* tab, bool expectLoaded) { 112 void CheckWorkerLoadResult(WebContents* tab, bool expectLoaded) {
110 // Workers are async and we don't have notifications for them passing 113 // Workers are async and we don't have notifications for them passing
111 // messages since they do it between renderer and worker processes. 114 // messages since they do it between renderer and worker processes.
112 // So have a polling loop, check every 200ms, timeout at 30s. 115 // So have a polling loop, check every 200ms, timeout at 30s.
113 const int timeout_ms = 200; 116 const int timeout_ms = 200;
114 base::Time timeToQuit = base::Time::Now() + 117 base::Time timeToQuit = base::Time::Now() +
115 base::TimeDelta::FromMilliseconds(30000); 118 base::TimeDelta::FromMilliseconds(30000);
116 119
(...skipping 190 matching lines...) Expand 10 before | Expand all | Expand 10 after
307 true); // Interstitial showing 310 true); // Interstitial showing
308 311
309 ProceedThroughInterstitial(tab); 312 ProceedThroughInterstitial(tab);
310 313
311 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 314 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
312 false); // No interstitial showing 315 false); // No interstitial showing
313 } 316 }
314 317
315 // Visits a page with https error and don't proceed (and ensure we can still 318 // Visits a page with https error and don't proceed (and ensure we can still
316 // navigate at that point): 319 // navigate at that point):
317 // Disabled, flakily exceeds test timeout, http://crbug.com/43575. 320 IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndDontProceed) {
318 // Marked as flaky, see bug 40932.
319 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestHTTPSExpiredCertAndDontProceed) {
320 ASSERT_TRUE(test_server()->Start()); 321 ASSERT_TRUE(test_server()->Start());
321 ASSERT_TRUE(https_server_.Start()); 322 ASSERT_TRUE(https_server_.Start());
322 ASSERT_TRUE(https_server_expired_.Start()); 323 ASSERT_TRUE(https_server_expired_.Start());
323 324
324 // First navigate to an OK page. 325 // First navigate to an OK page.
325 ui_test_utils::NavigateToURL(browser(), 326 ui_test_utils::NavigateToURL(browser(),
326 https_server_.GetURL("files/ssl/google.html")); 327 https_server_.GetURL("files/ssl/google.html"));
327 328
328 WebContents* tab = browser()->GetSelectedWebContents(); 329 WebContents* tab = browser()->GetSelectedWebContents();
329 NavigationEntry* entry = tab->GetController().GetActiveEntry(); 330 NavigationEntry* entry = tab->GetController().GetActiveEntry();
(...skipping 24 matching lines...) Expand all
354 // We should be back to the original good page. 355 // We should be back to the original good page.
355 CheckAuthenticatedState(tab, false); 356 CheckAuthenticatedState(tab, false);
356 357
357 // Try to navigate to a new page. (to make sure bug 5800 is fixed). 358 // Try to navigate to a new page. (to make sure bug 5800 is fixed).
358 ui_test_utils::NavigateToURL(browser(), 359 ui_test_utils::NavigateToURL(browser(),
359 test_server()->GetURL("files/ssl/google.html")); 360 test_server()->GetURL("files/ssl/google.html"));
360 CheckUnauthenticatedState(tab); 361 CheckUnauthenticatedState(tab);
361 } 362 }
362 363
363 // Visits a page with https error and then goes back using Browser::GoBack. 364 // Visits a page with https error and then goes back using Browser::GoBack.
364 // See bug 114185.
365 // Marked as flaky, see bug 40932.
366 IN_PROC_BROWSER_TEST_F(SSLUITest, 365 IN_PROC_BROWSER_TEST_F(SSLUITest,
367 DISABLED_TestHTTPSExpiredCertAndGoBackViaButton) { 366 TestHTTPSExpiredCertAndGoBackViaButton) {
368 ASSERT_TRUE(test_server()->Start()); 367 ASSERT_TRUE(test_server()->Start());
369 ASSERT_TRUE(https_server_expired_.Start()); 368 ASSERT_TRUE(https_server_expired_.Start());
370 369
371 // First navigate to an HTTP page. 370 // First navigate to an HTTP page.
372 ui_test_utils::NavigateToURL(browser(), 371 ui_test_utils::NavigateToURL(browser(),
373 test_server()->GetURL("files/ssl/google.html")); 372 test_server()->GetURL("files/ssl/google.html"));
374 WebContents* tab = browser()->GetSelectedWebContents(); 373 WebContents* tab = browser()->GetSelectedWebContents();
375 NavigationEntry* entry = tab->GetController().GetActiveEntry(); 374 NavigationEntry* entry = tab->GetController().GetActiveEntry();
376 ASSERT_TRUE(entry); 375 ASSERT_TRUE(entry);
377 376
(...skipping 14 matching lines...) Expand all
392 // the previous page. Prevents regression of http://crbug.com/82667. 391 // the previous page. Prevents regression of http://crbug.com/82667.
393 load_failed_observer.Wait(); 392 load_failed_observer.Wait();
394 EXPECT_FALSE(tab->GetRenderViewHost()->is_swapped_out()); 393 EXPECT_FALSE(tab->GetRenderViewHost()->is_swapped_out());
395 394
396 // We should be back at the original good page. 395 // We should be back at the original good page.
397 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage()); 396 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage());
398 CheckUnauthenticatedState(tab); 397 CheckUnauthenticatedState(tab);
399 } 398 }
400 399
401 // Visits a page with https error and then goes back using GoToOffset. 400 // Visits a page with https error and then goes back using GoToOffset.
402 // See bug 114185.
403 // Marked as flaky, see bug 40932.
404 IN_PROC_BROWSER_TEST_F(SSLUITest, 401 IN_PROC_BROWSER_TEST_F(SSLUITest,
405 DISABLED_TestHTTPSExpiredCertAndGoBackViaMenu) { 402 TestHTTPSExpiredCertAndGoBackViaMenu) {
406 ASSERT_TRUE(test_server()->Start()); 403 ASSERT_TRUE(test_server()->Start());
407 ASSERT_TRUE(https_server_expired_.Start()); 404 ASSERT_TRUE(https_server_expired_.Start());
408 405
409 // First navigate to an HTTP page. 406 // First navigate to an HTTP page.
410 ui_test_utils::NavigateToURL(browser(), 407 ui_test_utils::NavigateToURL(browser(),
411 test_server()->GetURL("files/ssl/google.html")); 408 test_server()->GetURL("files/ssl/google.html"));
412 WebContents* tab = browser()->GetSelectedWebContents(); 409 WebContents* tab = browser()->GetSelectedWebContents();
413 NavigationEntry* entry = tab->GetController().GetActiveEntry(); 410 NavigationEntry* entry = tab->GetController().GetActiveEntry();
414 ASSERT_TRUE(entry); 411 ASSERT_TRUE(entry);
415 412
416 // Now go to a bad HTTPS page that shows an interstitial. 413 // Now go to a bad HTTPS page that shows an interstitial.
417 ui_test_utils::NavigateToURL(browser(), 414 ui_test_utils::NavigateToURL(browser(),
418 https_server_expired_.GetURL("files/ssl/google.html")); 415 https_server_expired_.GetURL("files/ssl/google.html"));
419 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 416 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
420 true); // Interstitial showing 417 true); // Interstitial showing
421 418
422 // Simulate user clicking and holding on back button (crbug.com/37215). 419 // Simulate user clicking and holding on back button (crbug.com/37215).
423 tab->GetController().GoToOffset(-1); 420 tab->GetController().GoToOffset(-1);
424 421
425 // We should be back at the original good page. 422 // We should be back at the original good page.
426 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage()); 423 EXPECT_FALSE(browser()->GetSelectedWebContents()->GetInterstitialPage());
427 CheckUnauthenticatedState(tab); 424 CheckUnauthenticatedState(tab);
428 } 425 }
429 426
430 // Visits a page with https error and then goes forward using GoToOffset. 427 // Visits a page with https error and then goes forward using GoToOffset.
431 // Marked as flaky, see bug 40932. 428 IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) {
432 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestHTTPSExpiredCertAndGoForward) {
433 ASSERT_TRUE(test_server()->Start()); 429 ASSERT_TRUE(test_server()->Start());
434 ASSERT_TRUE(https_server_expired_.Start()); 430 ASSERT_TRUE(https_server_expired_.Start());
435 431
436 // First navigate to two HTTP pages. 432 // First navigate to two HTTP pages.
437 ui_test_utils::NavigateToURL(browser(), 433 ui_test_utils::NavigateToURL(browser(),
438 test_server()->GetURL("files/ssl/google.html")); 434 test_server()->GetURL("files/ssl/google.html"));
439 WebContents* tab = browser()->GetSelectedWebContents(); 435 WebContents* tab = browser()->GetSelectedWebContents();
440 NavigationEntry* entry1 = tab->GetController().GetActiveEntry(); 436 NavigationEntry* entry1 = tab->GetController().GetActiveEntry();
441 ASSERT_TRUE(entry1); 437 ASSERT_TRUE(entry1);
442 ui_test_utils::NavigateToURL(browser(), 438 ui_test_utils::NavigateToURL(browser(),
(...skipping 141 matching lines...) Expand 10 before | Expand all | Expand 10 after
584 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( 580 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
585 "files/ssl/page_runs_insecure_content.html")); 581 "files/ssl/page_runs_insecure_content.html"));
586 582
587 CheckAuthenticationBrokenState(browser()->GetSelectedWebContents(), 0, true, 583 CheckAuthenticationBrokenState(browser()->GetSelectedWebContents(), 0, true,
588 false); 584 false);
589 } 585 }
590 586
591 // Visits a page with unsafe content and make sure that: 587 // Visits a page with unsafe content and make sure that:
592 // - frames content is replaced with warning 588 // - frames content is replaced with warning
593 // - images and scripts are filtered out entirely 589 // - images and scripts are filtered out entirely
594 // Marked as flaky, see bug 40932. 590 IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) {
595 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnsafeContents) {
596 ASSERT_TRUE(https_server_.Start()); 591 ASSERT_TRUE(https_server_.Start());
597 ASSERT_TRUE(https_server_expired_.Start()); 592 ASSERT_TRUE(https_server_expired_.Start());
598 593
599 std::string replacement_path; 594 std::string replacement_path;
600 ASSERT_TRUE(GetFilePathWithHostAndPortReplacement( 595 ASSERT_TRUE(GetFilePathWithHostAndPortReplacement(
601 "files/ssl/page_with_unsafe_contents.html", 596 "files/ssl/page_with_unsafe_contents.html",
602 https_server_expired_.host_port_pair(), 597 https_server_expired_.host_port_pair(),
603 &replacement_path)); 598 &replacement_path));
604 ui_test_utils::NavigateToURL(browser(), 599 ui_test_utils::NavigateToURL(browser(),
605 https_server_.GetURL(replacement_path)); 600 https_server_.GetURL(replacement_path));
(...skipping 323 matching lines...) Expand 10 before | Expand all | Expand 10 after
929 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 924 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
930 true); // Interstitial showing. 925 true); // Interstitial showing.
931 926
932 ProceedThroughInterstitial(tab); 927 ProceedThroughInterstitial(tab);
933 928
934 // We have been redirected to the good page. 929 // We have been redirected to the good page.
935 CheckAuthenticatedState(tab, false); 930 CheckAuthenticatedState(tab, false);
936 } 931 }
937 932
938 // Visit a page over good https that is a redirect to a page with bad https. 933 // Visit a page over good https that is a redirect to a page with bad https.
939 // Marked as flaky, see bug 40932. 934 IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectGoodToBadHTTPS) {
940 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestRedirectGoodToBadHTTPS) {
941 ASSERT_TRUE(https_server_.Start()); 935 ASSERT_TRUE(https_server_.Start());
942 ASSERT_TRUE(https_server_expired_.Start()); 936 ASSERT_TRUE(https_server_expired_.Start());
943 937
944 GURL url1 = https_server_.GetURL("server-redirect?"); 938 GURL url1 = https_server_.GetURL("server-redirect?");
945 GURL url2 = https_server_expired_.GetURL("files/ssl/google.html"); 939 GURL url2 = https_server_expired_.GetURL("files/ssl/google.html");
946 ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec())); 940 ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec()));
947 941
948 WebContents* tab = browser()->GetSelectedWebContents(); 942 WebContents* tab = browser()->GetSelectedWebContents();
949 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 943 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
950 true); // Interstitial showing. 944 true); // Interstitial showing.
(...skipping 15 matching lines...) Expand all
966 GURL http_url = test_server()->GetURL("server-redirect?"); 960 GURL http_url = test_server()->GetURL("server-redirect?");
967 GURL good_https_url = 961 GURL good_https_url =
968 https_server_.GetURL("files/ssl/google.html"); 962 https_server_.GetURL("files/ssl/google.html");
969 963
970 ui_test_utils::NavigateToURL(browser(), 964 ui_test_utils::NavigateToURL(browser(),
971 GURL(http_url.spec() + good_https_url.spec())); 965 GURL(http_url.spec() + good_https_url.spec()));
972 CheckAuthenticatedState(tab, false); 966 CheckAuthenticatedState(tab, false);
973 } 967 }
974 968
975 // Visit a page over http that is a redirect to a page with bad HTTPS. 969 // Visit a page over http that is a redirect to a page with bad HTTPS.
976 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestRedirectHTTPToBadHTTPS) { 970 IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToBadHTTPS) {
977 ASSERT_TRUE(test_server()->Start()); 971 ASSERT_TRUE(test_server()->Start());
978 ASSERT_TRUE(https_server_expired_.Start()); 972 ASSERT_TRUE(https_server_expired_.Start());
979 973
980 WebContents* tab = browser()->GetSelectedWebContents(); 974 WebContents* tab = browser()->GetSelectedWebContents();
981 975
982 GURL http_url = test_server()->GetURL("server-redirect?"); 976 GURL http_url = test_server()->GetURL("server-redirect?");
983 GURL bad_https_url = 977 GURL bad_https_url =
984 https_server_expired_.GetURL("files/ssl/google.html"); 978 https_server_expired_.GetURL("files/ssl/google.html");
985 ui_test_utils::NavigateToURL(browser(), 979 ui_test_utils::NavigateToURL(browser(),
986 GURL(http_url.spec() + bad_https_url.spec())); 980 GURL(http_url.spec() + bad_https_url.spec()));
987 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 981 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
988 true); // Interstitial showing. 982 true); // Interstitial showing.
989 983
990 ProceedThroughInterstitial(tab); 984 ProceedThroughInterstitial(tab);
991 985
992 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 986 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
993 false); // No interstitial showing. 987 false); // No interstitial showing.
994 } 988 }
995 989
996 // Visit a page over https that is a redirect to a page with http (to make sure 990 // Visit a page over https that is a redirect to a page with http (to make sure
997 // we don't keep the secure state). 991 // we don't keep the secure state).
998 // Marked as flaky, see bug 40932. 992 IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) {
999 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestRedirectHTTPSToHTTP) {
1000 ASSERT_TRUE(test_server()->Start()); 993 ASSERT_TRUE(test_server()->Start());
1001 ASSERT_TRUE(https_server_.Start()); 994 ASSERT_TRUE(https_server_.Start());
1002 995
1003 GURL https_url = https_server_.GetURL("server-redirect?"); 996 GURL https_url = https_server_.GetURL("server-redirect?");
1004 GURL http_url = test_server()->GetURL("files/ssl/google.html"); 997 GURL http_url = test_server()->GetURL("files/ssl/google.html");
1005 998
1006 ui_test_utils::NavigateToURL(browser(), 999 ui_test_utils::NavigateToURL(browser(),
1007 GURL(https_url.spec() + http_url.spec())); 1000 GURL(https_url.spec() + http_url.spec()));
1008 CheckUnauthenticatedState(browser()->GetSelectedWebContents()); 1001 CheckUnauthenticatedState(browser()->GetSelectedWebContents());
1009 } 1002 }
(...skipping 110 matching lines...) Expand 10 before | Expand all | Expand 10 after
1120 content::NOTIFICATION_LOAD_STOP, 1113 content::NOTIFICATION_LOAD_STOP,
1121 content::Source<NavigationController>(&tab->GetController())); 1114 content::Source<NavigationController>(&tab->GetController()));
1122 tab->GetController().GoBack(); 1115 tab->GetController().GoBack();
1123 observer.Wait(); 1116 observer.Wait();
1124 } 1117 }
1125 CheckAuthenticatedState(tab, true); 1118 CheckAuthenticatedState(tab, true);
1126 } 1119 }
1127 1120
1128 // From a bad HTTPS top frame: 1121 // From a bad HTTPS top frame:
1129 // - navigate to an OK HTTPS frame (expected to be still authentication broken). 1122 // - navigate to an OK HTTPS frame (expected to be still authentication broken).
1130 // Marked as flaky, see bug 40932. 1123 IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) {
1131 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestBadFrameNavigation) {
1132 ASSERT_TRUE(https_server_.Start()); 1124 ASSERT_TRUE(https_server_.Start());
1133 ASSERT_TRUE(https_server_expired_.Start()); 1125 ASSERT_TRUE(https_server_expired_.Start());
1134 1126
1135 std::string top_frame_path; 1127 std::string top_frame_path;
1136 ASSERT_TRUE(GetTopFramePath(*test_server(), 1128 ASSERT_TRUE(GetTopFramePath(*test_server(),
1137 https_server_, 1129 https_server_,
1138 https_server_expired_, 1130 https_server_expired_,
1139 &top_frame_path)); 1131 &top_frame_path));
1140 1132
1141 WebContents* tab = browser()->GetSelectedWebContents(); 1133 WebContents* tab = browser()->GetSelectedWebContents();
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after
1220 bool is_content_evil = true; 1212 bool is_content_evil = true;
1221 std::wstring content_frame_xpath(L"html/frameset/frame[2]"); 1213 std::wstring content_frame_xpath(L"html/frameset/frame[2]");
1222 std::wstring is_evil_js(L"window.domAutomationController.send(" 1214 std::wstring is_evil_js(L"window.domAutomationController.send("
1223 L"document.getElementById('evilDiv') != null);"); 1215 L"document.getElementById('evilDiv') != null);");
1224 EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool( 1216 EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
1225 tab->GetRenderViewHost(), content_frame_xpath, is_evil_js, 1217 tab->GetRenderViewHost(), content_frame_xpath, is_evil_js,
1226 &is_content_evil)); 1218 &is_content_evil));
1227 EXPECT_FALSE(is_content_evil); 1219 EXPECT_FALSE(is_content_evil);
1228 } 1220 }
1229 1221
1230 // Marked as flaky, see bug 40932. 1222 IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerFiltered) {
1231 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnsafeContentsInWorkerFiltered) {
1232 ASSERT_TRUE(https_server_.Start()); 1223 ASSERT_TRUE(https_server_.Start());
1233 ASSERT_TRUE(https_server_expired_.Start()); 1224 ASSERT_TRUE(https_server_expired_.Start());
1234 1225
1235 // This page will spawn a Worker which will try to load content from 1226 // This page will spawn a Worker which will try to load content from
1236 // BadCertServer. 1227 // BadCertServer.
1237 std::string page_with_unsafe_worker_path; 1228 std::string page_with_unsafe_worker_path;
1238 ASSERT_TRUE(GetPageWithUnsafeWorkerPath(https_server_expired_, 1229 ASSERT_TRUE(GetPageWithUnsafeWorkerPath(https_server_expired_,
1239 &page_with_unsafe_worker_path)); 1230 &page_with_unsafe_worker_path));
1240 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( 1231 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
1241 page_with_unsafe_worker_path)); 1232 page_with_unsafe_worker_path));
1242 WebContents* tab = browser()->GetSelectedWebContents(); 1233 WebContents* tab = browser()->GetSelectedWebContents();
1243 // Expect Worker not to load insecure content. 1234 // Expect Worker not to load insecure content.
1244 CheckWorkerLoadResult(tab, false); 1235 CheckWorkerLoadResult(tab, false);
1245 // The bad content is filtered, expect the state to be authenticated. 1236 // The bad content is filtered, expect the state to be authenticated.
1246 CheckAuthenticatedState(tab, false); 1237 CheckAuthenticatedState(tab, false);
1247 } 1238 }
1248 1239
1249 // Marked as flaky, see bug 40932. 1240 IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorker) {
1250 IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnsafeContentsInWorker) {
1251 ASSERT_TRUE(https_server_.Start()); 1241 ASSERT_TRUE(https_server_.Start());
1252 ASSERT_TRUE(https_server_expired_.Start()); 1242 ASSERT_TRUE(https_server_expired_.Start());
1253 1243
1254 // Navigate to an unsafe site. Proceed with interstitial page to indicate 1244 // Navigate to an unsafe site. Proceed with interstitial page to indicate
1255 // the user approves the bad certificate. 1245 // the user approves the bad certificate.
1256 ui_test_utils::NavigateToURL(browser(), 1246 ui_test_utils::NavigateToURL(browser(),
1257 https_server_expired_.GetURL("files/ssl/blank_page.html")); 1247 https_server_expired_.GetURL("files/ssl/blank_page.html"));
1258 WebContents* tab = browser()->GetSelectedWebContents(); 1248 WebContents* tab = browser()->GetSelectedWebContents();
1259 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, 1249 CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
1260 true); // Interstitial showing 1250 true); // Interstitial showing
(...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after
1337 1327
1338 // Visit a page over https that contains a frame with a redirect. 1328 // Visit a page over https that contains a frame with a redirect.
1339 1329
1340 // XMLHttpRequest insecure content in synchronous mode. 1330 // XMLHttpRequest insecure content in synchronous mode.
1341 1331
1342 // XMLHttpRequest insecure content in asynchronous mode. 1332 // XMLHttpRequest insecure content in asynchronous mode.
1343 1333
1344 // XMLHttpRequest over bad ssl in synchronous mode. 1334 // XMLHttpRequest over bad ssl in synchronous mode.
1345 1335
1346 // XMLHttpRequest over OK ssl in synchronous mode. 1336 // XMLHttpRequest over OK ssl in synchronous mode.
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698