| Index: chrome/browser/ssl/ssl_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc
|
| index 304b16aa51bc5b209919199caad002cd320d8467..78047d2e379d9c89d8b29132e99b7f35c9e27861 100644
|
| --- a/chrome/browser/ssl/ssl_browser_tests.cc
|
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc
|
| @@ -232,8 +232,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) {
|
|
|
| int img_width;
|
| EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractInt(
|
| - tab, L"", L"window.domAutomationController.send(ImageWidth());",
|
| - &img_width));
|
| + tab->render_view_host(), L"",
|
| + L"window.domAutomationController.send(ImageWidth());", &img_width));
|
| // In order to check that the image was not loaded, we check its width.
|
| // The actual image (Google logo) is 114 pixels wide, we assume the broken
|
| // image is less than 100.
|
| @@ -241,8 +241,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) {
|
|
|
| bool js_result = false;
|
| EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| - tab, L"", L"window.domAutomationController.send(IsFooSet());",
|
| - &js_result));
|
| + tab->render_view_host(), L"",
|
| + L"window.domAutomationController.send(IsFooSet());", &js_result));
|
| EXPECT_FALSE(js_result);
|
| }
|
|
|
| @@ -260,7 +260,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestMixedContentsLoadedFromJS) {
|
| // Load the insecure image.
|
| bool js_result = false;
|
| EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| - tab, L"", L"loadBadImage();", &js_result));
|
| + tab->render_view_host(), L"", L"loadBadImage();", &js_result));
|
| EXPECT_TRUE(js_result);
|
|
|
| // We should now have mixed-contents.
|
| @@ -578,8 +578,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
|
|
| bool success = false;
|
| // Now navigate inside the frame.
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| - L"",
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(), L"",
|
| L"window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| &success));
|
| EXPECT_TRUE(success);
|
| @@ -589,8 +589,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| CheckAuthenticatedState(tab, false, false);
|
|
|
| // Now let's hit a bad page.
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| - L"",
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(), L"",
|
| L"window.domAutomationController.send(clickLink('badHTTPSLink'));",
|
| &success));
|
| EXPECT_TRUE(success);
|
| @@ -605,7 +605,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| std::wstring is_frame_evil_js(
|
| L"window.domAutomationController"
|
| L".send(document.getElementById('evilDiv') != null);");
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(),
|
| content_frame_xpath,
|
| is_frame_evil_js,
|
| &is_content_evil));
|
| @@ -617,7 +618,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| CheckAuthenticatedState(tab, false, false);
|
|
|
| // Navigate to a page served over HTTP.
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(),
|
| L"",
|
| L"window.domAutomationController.send(clickLink('HTTPLink'));",
|
| &success));
|
| @@ -654,7 +656,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) {
|
|
|
| // Navigate to a good frame.
|
| bool success = false;
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(),
|
| L"",
|
| L"window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| &success));
|
| @@ -680,8 +683,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnauthenticatedFrameNavigation) {
|
|
|
| // Now navigate inside the frame to a secure HTTPS frame.
|
| bool success = false;
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| - L"",
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(), L"",
|
| L"window.domAutomationController.send(clickLink('goodHTTPSLink'));",
|
| &success));
|
| EXPECT_TRUE(success);
|
| @@ -691,7 +694,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnauthenticatedFrameNavigation) {
|
| CheckUnauthenticatedState(tab);
|
|
|
| // Now navigate to a bad HTTPS frame.
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(),
|
| L"",
|
| L"window.domAutomationController.send(clickLink('badHTTPSLink'));",
|
| &success));
|
| @@ -707,8 +711,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnauthenticatedFrameNavigation) {
|
| std::wstring is_frame_evil_js(
|
| L"window.domAutomationController"
|
| L".send(document.getElementById('evilDiv') != null);");
|
| - EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(tab,
|
| - content_frame_xpath, is_frame_evil_js, &is_content_evil));
|
| + EXPECT_TRUE(ui_test_utils::ExecuteJavaScriptAndExtractBool(
|
| + tab->render_view_host(), content_frame_xpath, is_frame_evil_js,
|
| + &is_content_evil));
|
| EXPECT_FALSE(is_content_evil);
|
| }
|
|
|
|
|