Index: chrome/browser/ssl/ssl_browser_tests.cc |
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc |
index a0d2279be8ab6f0fde2fea9c8f914f516707565b..aab0cd2f2b1f338dc4c956b82b4c67fffef343ce 100644 |
--- a/chrome/browser/ssl/ssl_browser_tests.cc |
+++ b/chrome/browser/ssl/ssl_browser_tests.cc |
@@ -12,6 +12,8 @@ |
#include "chrome/common/pref_names.h" |
#include "chrome/test/in_process_browser_test.h" |
#include "chrome/test/ui_test_utils.h" |
+#include "net/base/cert_status_flags.h" |
+#include "net/test/test_server.h" |
const wchar_t kDocRoot[] = L"chrome/test/data"; |
@@ -21,16 +23,16 @@ class SSLUITest : public InProcessBrowserTest { |
EnableDOMAutomation(); |
} |
- scoped_refptr<HTTPTestServer> PlainServer() { |
- return HTTPTestServer::CreateServer(kDocRoot); |
+ scoped_refptr<net::HTTPTestServer> PlainServer() { |
+ return net::HTTPTestServer::CreateServer(kDocRoot); |
} |
- scoped_refptr<HTTPSTestServer> GoodCertServer() { |
- return HTTPSTestServer::CreateGoodServer(kDocRoot); |
+ scoped_refptr<net::HTTPSTestServer> GoodCertServer() { |
+ return net::HTTPSTestServer::CreateGoodServer(kDocRoot); |
} |
- scoped_refptr<HTTPSTestServer> BadCertServer() { |
- return HTTPSTestServer::CreateExpiredServer(kDocRoot); |
+ scoped_refptr<net::HTTPSTestServer> BadCertServer() { |
+ return net::HTTPSTestServer::CreateExpiredServer(kDocRoot); |
} |
void CheckAuthenticatedState(TabContents* tab, |
@@ -120,7 +122,7 @@ class SSLUITest : public InProcessBrowserTest { |
// Visits a regular page over http. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) { |
- scoped_refptr<HTTPTestServer> server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> server = PlainServer(); |
ASSERT_TRUE(server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -134,9 +136,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) { |
// TODO(jcampan): test that bad HTTPS content is blocked (otherwise we'll give |
// the secure cookies away!). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -147,7 +149,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) { |
// Visits a page over OK https: |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestOKHTTPS) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -158,7 +160,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestOKHTTPS) { |
// Visits a page with https error and proceed: |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndProceed) { |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -186,11 +188,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndProceed) { |
FLAKY_TestHTTPSExpiredCertAndDontProceed |
#endif |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndDontProceed) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
// First navigate to an OK page. |
@@ -234,9 +236,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndDontProceed) { |
// Visits a page with https error and then goes back using Browser::GoBack. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoBackViaButton) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
// First navigate to an HTTP page. |
@@ -263,9 +265,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoBackViaButton) { |
// Visits a page with https error and then goes back using GoToOffset. |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoBackViaMenu) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
// First navigate to an HTTP page. |
@@ -292,9 +294,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoBackViaMenu) { |
// Visits a page with https error and then goes forward using GoToOffset. |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoForward) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
// First navigate to two HTTP pages. |
@@ -338,9 +340,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoForward) { |
// does not cause any problems (it was causing a crasher, see |
// http://crbug.com/19941). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSErrorWithNoNavEntry) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
// Load a page with a link that opens a new window (therefore with no history |
@@ -382,9 +384,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSErrorWithNoNavEntry) { |
// Visits a page that displays insecure content. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContent) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
// Load a page that displays insecure content. |
@@ -398,9 +400,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContent) { |
// content warnings by randomizing location.hash. |
// Based on http://crbug.com/8706 |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecuredContentRandomizeHash) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), https_server->TestServerPage( |
@@ -415,9 +417,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecuredContentRandomizeHash) { |
// - images and scripts are filtered out entirely |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContents) { |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), good_https_server->TestServerPage( |
@@ -454,9 +456,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContents) { |
// Visits a page with insecure content loaded by JS (after the initial page |
// load). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentLoadedFromJS) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), https_server->TestServerPage( |
@@ -479,9 +481,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentLoadedFromJS) { |
// one that doesn't. The test checks that we do not propagate the insecure |
// content state from one to the other. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentTwoTabs) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -511,9 +513,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentTwoTabs) { |
// that doesn't. The test checks that we propagate the insecure content state |
// from one to the other. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -544,9 +546,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) { |
// referencing that same image over http (hoping it is coming from the webcore |
// memory cache). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), http_server->TestServerPage( |
@@ -565,9 +567,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) { |
// referencing that same script over http (hoping it is coming from the webcore |
// memory cache). |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsCachedInsecureContent) { |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -593,8 +595,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsCachedInsecureContent) { |
// (see bug #1044942) and that it depends on the host-name. |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestCNInvalidStickiness) { |
const std::string kLocalHost = "localhost"; |
- scoped_refptr<HTTPSTestServer> https_server = |
- HTTPSTestServer::CreateMismatchedServer(kDocRoot); |
+ scoped_refptr<net::HTTPSTestServer> https_server = |
+ net::HTTPSTestServer::CreateMismatchedServer(kDocRoot); |
ASSERT_TRUE(https_server.get() != NULL); |
// First we hit the server with hostname, this generates an invalid policy |
@@ -639,7 +641,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestCNInvalidStickiness) { |
// Test that navigating to a #ref does not change a bad security state. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) { |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -668,9 +670,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) { |
// TODO(jcampan): http://crbug.com/2136 disabled because the popup is not |
// opened as it is not initiated by a user gesture. |
IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
ui_test_utils::NavigateToURL(browser(), |
@@ -703,9 +705,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) { |
// Visit a page over bad https that is a redirect to a page with good https. |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectBadToGoodHTTPS) { |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
GURL url1 = bad_https_server->TestServerPage("server-redirect?"); |
@@ -727,9 +729,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectBadToGoodHTTPS) { |
// Visit a page over good https that is a redirect to a page with bad https. |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectGoodToBadHTTPS) { |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
GURL url1 = good_https_server->TestServerPage("server-redirect?"); |
@@ -748,9 +750,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectGoodToBadHTTPS) { |
// Visit a page over http that is a redirect to a page with good HTTPS. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
TabContents* tab = browser()->GetSelectedTabContents(); |
@@ -767,9 +769,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) { |
// Visit a page over http that is a redirect to a page with bad HTTPS. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectHTTPToBadHTTPS) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
TabContents* tab = browser()->GetSelectedTabContents(); |
@@ -792,9 +794,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectHTTPToBadHTTPS) { |
// we don't keep the secure state). |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectHTTPSToHTTP) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer(); |
ASSERT_TRUE(https_server.get() != NULL); |
GURL https_url = https_server->TestServerPage("server-redirect?"); |
@@ -827,11 +829,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestConnectToBadPort) { |
// - navigate to HTTP (expect insecure content), then back |
// Disabled, http://crbug.com/18626. |
IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestGoodFrameNavigation) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
TabContents* tab = browser()->GetSelectedTabContents(); |
@@ -899,9 +901,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestGoodFrameNavigation) { |
// - navigate to an OK HTTPS frame (expected to be still authentication broken). |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestBadFrameNavigation) { |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
TabContents* tab = browser()->GetSelectedTabContents(); |
@@ -938,11 +940,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestBadFrameNavigation) { |
FLAKY_TestUnauthenticatedFrameNavigation |
#endif |
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestUnauthenticatedFrameNavigation) { |
- scoped_refptr<HTTPTestServer> http_server = PlainServer(); |
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer(); |
ASSERT_TRUE(http_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
TabContents* tab = browser()->GetSelectedTabContents(); |
@@ -986,9 +988,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestUnauthenticatedFrameNavigation) { |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContentsInWorkerFiltered) { |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
// This page will spawn a Worker which will try to load content from |
@@ -1004,9 +1006,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContentsInWorkerFiltered) { |
// Marked as flaky, see bug 40932. |
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContentsInWorker) { |
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer(); |
ASSERT_TRUE(good_https_server.get() != NULL); |
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer(); |
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer(); |
ASSERT_TRUE(bad_https_server.get() != NULL); |
// Navigate to an unsafe site. Proceed with interstitial page to indicate |