Index: chrome/browser/ssl/ssl_uitest.cc |
=================================================================== |
--- chrome/browser/ssl/ssl_uitest.cc (revision 17078) |
+++ chrome/browser/ssl/ssl_uitest.cc (working copy) |
@@ -25,8 +25,8 @@ |
dom_automation_enabled_ = true; |
} |
- TabProxy* GetActiveTabProxy() { |
- scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
+ scoped_refptr<TabProxy> GetActiveTabProxy() { |
+ scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
EXPECT_TRUE(browser_proxy.get()); |
return browser_proxy->GetActiveTab(); |
} |
@@ -36,7 +36,7 @@ |
} |
void AppendTab(const GURL& url) { |
- scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
+ scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
EXPECT_TRUE(browser_proxy.get()); |
EXPECT_TRUE(browser_proxy->AppendTab(url)); |
} |
@@ -80,7 +80,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), server->TestServerPageW(L"files/ssl/google.html")); |
NavigationEntry::PageType page_type; |
@@ -104,7 +104,7 @@ |
scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab( |
tab.get(), |
@@ -126,7 +126,7 @@ |
scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), |
https_server->TestServerPageW(L"files/ssl/google.html")); |
@@ -149,7 +149,7 @@ |
scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), |
bad_https_server->TestServerPageW(L"files/ssl/google.html")); |
@@ -186,7 +186,7 @@ |
scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
// First navigate to an OK page. |
NavigateTab(tab.get(), |
@@ -251,7 +251,7 @@ |
// Load a page with mixed-content, the default behavior is to show the mixed |
// content. |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab( |
tab.get(), |
https_server->TestServerPageW( |
@@ -279,14 +279,14 @@ |
return; |
// Now select the block mixed-content pref and reload the page. |
- scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
+ scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
EXPECT_TRUE(browser_proxy.get()); |
EXPECT_TRUE(browser_proxy->SetIntPreference(prefs::kMixedContentFiltering, |
FilterPolicy::FILTER_ALL)); |
// Load a page with mixed-content, we've overridden our filtering policy so |
// we won't load the mixed content by default. |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab( |
tab.get(), |
https_server->TestServerPageW( |
@@ -346,7 +346,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab( |
tab.get(), |
https_server->TestServerPageW( |
@@ -374,7 +374,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), |
good_https_server->TestServerPageW( |
L"files/ssl/page_with_unsafe_contents.html")); |
@@ -426,7 +426,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), https_server->TestServerPageW( |
L"files/ssl/page_with_dynamic_mixed_contents.html")); |
NavigationEntry::PageType page_type; |
@@ -468,7 +468,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab1(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab1(GetActiveTabProxy()); |
NavigateTab( |
tab1.get(), |
https_server->TestServerPageW( |
@@ -487,12 +487,12 @@ |
EXPECT_EQ(0, cert_status & net::CERT_STATUS_ALL_ERRORS); |
EXPECT_EQ(NavigationEntry::SSLStatus::NORMAL_CONTENT, mixed_content_state); |
- scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
+ scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
EXPECT_TRUE(browser_proxy.get()); |
EXPECT_TRUE(browser_proxy->AppendTab( |
https_server->TestServerPageW(L"files/ssl/page_with_http_script.html"))); |
- scoped_ptr<TabProxy> tab2(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab2(GetActiveTabProxy()); |
EXPECT_TRUE(tab2->GetPageType(&page_type)); |
EXPECT_EQ(NavigationEntry::NORMAL_PAGE, page_type); |
@@ -521,7 +521,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), http_server->TestServerPageW( |
L"files/ssl/page_with_mixed_contents.html")); |
@@ -564,7 +564,7 @@ |
// First we hit the server with hostname, this generates an invalid policy |
// error. |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), https_server->TestServerPageW( |
L"files/ssl/google.html")); |
@@ -629,7 +629,7 @@ |
scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab( |
tab.get(), |
bad_https_server->TestServerPageW(L"files/ssl/page_with_refs.html")); |
@@ -677,7 +677,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), |
http_server->TestServerPageW( |
L"files/ssl/page_with_unsafe_popup.html")); |
@@ -688,7 +688,7 @@ |
// Let's add another tab to make sure the browser does not exit when we close |
// the first tab. |
- scoped_ptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
+ scoped_refptr<BrowserProxy> browser_proxy(automation()->GetBrowserWindow(0)); |
EXPECT_TRUE(browser_proxy.get()); |
browser_proxy->AppendTab( |
http_server->TestServerPageW(L"files/ssl/google.html")); |
@@ -704,7 +704,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
GURL url1 = bad_https_server->TestServerPageW(L"server-redirect?"); |
GURL url2 = good_https_server->TestServerPageW(L"files/ssl/google.html"); |
NavigateTab(tab.get(), GURL(url1.spec() + url2.spec())); |
@@ -739,7 +739,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
GURL url1 = good_https_server->TestServerPageW(L"server-redirect?"); |
GURL url2 = bad_https_server->TestServerPageW(L"files/ssl/google.html"); |
NavigateTab(tab.get(), GURL(url1.spec() + url2.spec())); |
@@ -771,7 +771,7 @@ |
return; |
// HTTP redirects to good HTTPS. |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
GURL http_url = http_server->TestServerPageW(L"server-redirect?"); |
GURL good_https_url = |
good_https_server->TestServerPageW(L"files/ssl/google.html"); |
@@ -814,7 +814,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
GURL https_url = https_server->TestServerPageW(L"server-redirect?"); |
GURL http_url = http_server->TestServerPageW(L"files/ssl/google.html"); |
NavigateTab(tab.get(), GURL(https_url.spec() + http_url.spec())); |
@@ -832,7 +832,7 @@ |
// Visits a page to which we could not connect (bad port) over http and https |
// and make sure the security style is correct. |
TEST_F(SSLUITest, TestConnectToBadPort) { |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
GURL http_url("http://localhost:17"); |
NavigateTab(tab.get(), http_url); |
@@ -873,7 +873,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), |
good_https_server->TestServerPageW(L"files/ssl/top_frame.html")); |
@@ -970,7 +970,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), |
bad_https_server->TestServerPageW(L"files/ssl/top_frame.html")); |
@@ -1015,7 +1015,7 @@ |
if (HasFailure()) |
return; |
- scoped_ptr<TabProxy> tab(GetActiveTabProxy()); |
+ scoped_refptr<TabProxy> tab(GetActiveTabProxy()); |
NavigateTab(tab.get(), |
http_server->TestServerPageW(L"files/ssl/top_frame.html")); |