Index: chrome/browser/ssl/ssl_browser_tests.cc |
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc |
index d0c359295707b2b473d5f6a88d20f1dacf6cd7ad..f2e1f136e347e095879c515fe4f1e87a6b86a121 100644 |
--- a/chrome/browser/ssl/ssl_browser_tests.cc |
+++ b/chrome/browser/ssl/ssl_browser_tests.cc |
@@ -840,7 +840,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) { |
test_server()->host_port_pair(), |
&replacement_path)); |
- // Create a new tab in the same process. |
+ // Create a new tab in the same process. Using a NEW_FOREGROUND_TAB |
+ // disposition won't usually stay in the same process, but this works |
+ // because we are using process-per-site in SetUpCommandLine. |
GURL url = https_server_.GetURL(replacement_path); |
browser::NavigateParams params( |
browser(), url, content::PAGE_TRANSITION_TYPED); |
@@ -853,6 +855,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) { |
TabContents* tab2 = params.target_contents; |
observer.Wait(); |
+ // Both tabs should have the same process. |
+ EXPECT_EQ(tab1->web_contents()->GetRenderProcessHost(), |
+ tab2->web_contents()->GetRenderProcessHost()); |
+ |
// The new tab has insecure content. |
CheckAuthenticationBrokenState(tab2->web_contents(), 0, true, false); |