Index: chrome/browser/chrome_security_exploit_browsertest.cc |
diff --git a/chrome/browser/chrome_security_exploit_browsertest.cc b/chrome/browser/chrome_security_exploit_browsertest.cc |
index 4486a02250c95ad72b08ca4bcf82febe928c4db1..94447577e6d9b0c0f454db1b80dcf655e52a3755 100644 |
--- a/chrome/browser/chrome_security_exploit_browsertest.cc |
+++ b/chrome/browser/chrome_security_exploit_browsertest.cc |
@@ -31,19 +31,14 @@ class ChromeSecurityExploitBrowserTest : public InProcessBrowserTest { |
~ChromeSecurityExploitBrowserTest() override {} |
void SetUpCommandLine(base::CommandLine* command_line) override { |
- ASSERT_TRUE(test_server()->Start()); |
- net::SpawnedTestServer https_server( |
- net::SpawnedTestServer::TYPE_HTTPS, |
- net::SpawnedTestServer::kLocalhost, |
- base::FilePath(FILE_PATH_LITERAL("chrome/test/data"))); |
- ASSERT_TRUE(https_server.Start()); |
+ ASSERT_TRUE(embedded_test_server()->Start()); |
// Add a host resolver rule to map all outgoing requests to the test server. |
// This allows us to use "real" hostnames in URLs, which we can use to |
// create arbitrary SiteInstances. |
command_line->AppendSwitchASCII( |
switches::kHostResolverRules, |
- "MAP * " + test_server()->host_port_pair().ToString() + |
+ "MAP * " + embedded_test_server()->host_port_pair().ToString() + |
",EXCLUDE localhost"); |
// Since we assume exploited renderer process, it can bypass the same origin |
@@ -59,7 +54,7 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityExploitBrowserTest, |
ChromeExtensionResources) { |
// Load a page that requests a chrome-extension:// image through XHR. We |
// expect this load to fail, as it is an illegal request. |
- GURL foo("http://foo.com/files/chrome_extension_resource.html"); |
+ GURL foo("http://foo.com/chrome_extension_resource.html"); |
content::DOMMessageQueue msg_queue; |