| Index: chrome/browser/ssl_uitest.cc
|
| ===================================================================
|
| --- chrome/browser/ssl_uitest.cc (revision 7513)
|
| +++ chrome/browser/ssl_uitest.cc (working copy)
|
| @@ -41,17 +41,17 @@
|
| EXPECT_TRUE(browser_proxy->AppendTab(url));
|
| }
|
|
|
| - HTTPTestServer* PlainServer() {
|
| - return HTTPTestServer::CreateServer(kDocRoot);
|
| + TestServer* PlainServer() {
|
| + return new TestServer(kDocRoot);
|
| }
|
|
|
| HTTPSTestServer* GoodCertServer() {
|
| - return HTTPSTestServer::CreateServer(util_.kHostName, util_.kOKHTTPSPort,
|
| + return new HTTPSTestServer(util_.kHostName, util_.kOKHTTPSPort,
|
| kDocRoot, util_.GetOKCertPath().ToWStringHack());
|
| }
|
|
|
| HTTPSTestServer* BadCertServer() {
|
| - return HTTPSTestServer::CreateServer(util_.kHostName, util_.kBadHTTPSPort,
|
| + return new HTTPSTestServer(util_.kHostName, util_.kBadHTTPSPort,
|
| kDocRoot, util_.GetExpiredCertPath().ToWStringHack());
|
| }
|
|
|
| @@ -65,7 +65,7 @@
|
|
|
| // Visits a regular page over http.
|
| TEST_F(SSLUITest, TestHTTP) {
|
| - scoped_ptr<HTTPTestServer> server(PlainServer());
|
| + scoped_ptr<TestServer> server(PlainServer());
|
|
|
| scoped_ptr<TabProxy> tab(GetActiveTabProxy());
|
| NavigateTab(tab.get(), server->TestServerPageW(L"files/ssl/google.html"));
|
| @@ -87,7 +87,7 @@
|
| // Visits a page over http which includes broken https resources (status should
|
| // be OK).
|
| TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) {
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
| scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer());
|
| scoped_ptr<TabProxy> tab(GetActiveTabProxy());
|
|
|
| @@ -164,7 +164,7 @@
|
| // Visits a page with mixed content.
|
| TEST_F(SSLUITest, TestMixedContents) {
|
| scoped_ptr<HTTPSTestServer> https_server(GoodCertServer());
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
|
|
| // Load a page with mixed-content, the default behavior is to show the mixed
|
| // content.
|
| @@ -286,7 +286,7 @@
|
| // Visits a page with mixed content loaded by JS (after the initial page load).
|
| TEST_F(SSLUITest, TestMixedContentsLoadedFromJS) {
|
| scoped_ptr<HTTPSTestServer> https_server(GoodCertServer());
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
|
|
| scoped_ptr<TabProxy> tab(GetActiveTabProxy());
|
| NavigateTab(tab.get(), https_server->TestServerPageW(
|
| @@ -325,7 +325,7 @@
|
| // memory cache).
|
| TEST_F(SSLUITest, TestCachedMixedContents) {
|
| scoped_ptr<HTTPSTestServer> https_server(GoodCertServer());
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
|
|
| scoped_ptr<TabProxy> tab(GetActiveTabProxy());
|
| NavigateTab(tab.get(), http_server->TestServerPageW(
|
| @@ -364,10 +364,9 @@
|
| // TODO(jcampan): this test is flacky and fails sometimes (bug #1065095)
|
| TEST_F(SSLUITest, DISABLED_TestCNInvalidStickiness) {
|
| const std::string kLocalHost = "localhost";
|
| - scoped_refptr<HTTPSTestServer> https_server =
|
| - HTTPSTestServer::CreateServer(kLocalHost, util_.kOKHTTPSPort,
|
| - kDocRoot, util_.GetOKCertPath().ToWStringHack());
|
| - ASSERT_TRUE(NULL != https_server.get());
|
| + scoped_ptr<HTTPSTestServer> https_server(
|
| + new HTTPSTestServer(kLocalHost, util_.kOKHTTPSPort,
|
| + kDocRoot, util_.GetOKCertPath().ToWStringHack()));
|
|
|
| // First we hit the server with hostname, this generates an invalid policy
|
| // error.
|
| @@ -476,7 +475,7 @@
|
| // (bug #1966).
|
| // Disabled because flaky (bug #2136).
|
| TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) {
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
| scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer());
|
|
|
| scoped_ptr<TabProxy> tab(GetActiveTabProxy());
|
| @@ -562,7 +561,7 @@
|
| // Visit a page over http that is a redirect to a page with https (good and
|
| // bad).
|
| TEST_F(SSLUITest, TestRedirectHTTPToHTTPS) {
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
| scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer());
|
| scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer());
|
|
|
| @@ -605,7 +604,7 @@
|
| // Visit a page over https that is a redirect to a page with http (to make sure
|
| // we don't keep the secure state).
|
| TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) {
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
| scoped_ptr<HTTPSTestServer> https_server(GoodCertServer());
|
|
|
| scoped_ptr<TabProxy> tab(GetActiveTabProxy());
|
| @@ -661,7 +660,7 @@
|
| // back
|
| // - navigate to HTTP (expect mixed content), then back
|
| TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
| scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer());
|
| scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer());
|
|
|
| @@ -799,7 +798,7 @@
|
| // From an HTTP top frame, navigate to good and bad HTTPS (security state should
|
| // stay unauthenticated).
|
| TEST_F(SSLUITest, TestUnauthenticatedFrameNavigation) {
|
| - scoped_ptr<HTTPTestServer> http_server(PlainServer());
|
| + scoped_ptr<TestServer> http_server(PlainServer());
|
| scoped_ptr<HTTPSTestServer> good_https_server(GoodCertServer());
|
| scoped_ptr<HTTPSTestServer> bad_https_server(BadCertServer());
|
|
|
|
|