Index: chrome/browser/ssl/ssl_browser_tests.cc |
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc |
index 8ec45cdbc7b483bf2e16e0c5e176685829676a7f..dcac5068986a590438cb51102de23fe118ed094d 100644 |
--- a/chrome/browser/ssl/ssl_browser_tests.cc |
+++ b/chrome/browser/ssl/ssl_browser_tests.cc |
@@ -1120,7 +1120,15 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestWSSInvalidCertAndGoForward) { |
// Ensure that non-standard origins are marked correctly when the |
// MarkNonSecureAs field trial is enabled. |
-IN_PROC_BROWSER_TEST_F(SSLUITest, TestMarkNonSecureAs) { |
+// |
+// Disabled on Windows until `file:///` navigation works under OOPIF. |
+// https://crbug.com/574997 |
+#if defined(OS_WIN) |
+#define MAYBE_MarkFileAsNonSecure DISABLED_MarkFileAsNonSecure |
+#else |
+#define MAYBE_MarkFileAsNonSecure MarkFileAsNonSecure |
+#endif |
+IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_MarkFileAsNonSecure) { |
scoped_refptr<base::FieldTrial> trial = |
base::FieldTrialList::CreateFieldTrial( |
"MarkNonSecureAs", |
@@ -1134,17 +1142,62 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestMarkNonSecureAs) { |
ChromeSecurityStateModelClient::FromWebContents(contents); |
ASSERT_TRUE(model_client); |
- ui_test_utils::NavigateToURL(browser(), GURL("file:/")); |
+ ui_test_utils::NavigateToURL(browser(), GURL("file:///")); |
EXPECT_EQ(security_state::SecurityStateModel::NONE, |
model_client->GetSecurityInfo().security_level); |
+} |
+ |
+IN_PROC_BROWSER_TEST_F(SSLUITest, MarkAboutAsNonSecure) { |
+ scoped_refptr<base::FieldTrial> trial = |
+ base::FieldTrialList::CreateFieldTrial( |
+ "MarkNonSecureAs", |
+ security_state::switches::kMarkNonSecureAsNonSecure); |
+ |
+ content::WebContents* contents = |
+ browser()->tab_strip_model()->GetActiveWebContents(); |
+ ASSERT_TRUE(contents); |
+ |
+ ChromeSecurityStateModelClient* model_client = |
+ ChromeSecurityStateModelClient::FromWebContents(contents); |
+ ASSERT_TRUE(model_client); |
ui_test_utils::NavigateToURL(browser(), GURL("about:blank")); |
EXPECT_EQ(security_state::SecurityStateModel::NONE, |
model_client->GetSecurityInfo().security_level); |
+} |
+ |
+IN_PROC_BROWSER_TEST_F(SSLUITest, MarkDataAsNonSecure) { |
+ scoped_refptr<base::FieldTrial> trial = |
+ base::FieldTrialList::CreateFieldTrial( |
+ "MarkNonSecureAs", |
+ security_state::switches::kMarkNonSecureAsNonSecure); |
+ |
+ content::WebContents* contents = |
+ browser()->tab_strip_model()->GetActiveWebContents(); |
+ ASSERT_TRUE(contents); |
+ |
+ ChromeSecurityStateModelClient* model_client = |
+ ChromeSecurityStateModelClient::FromWebContents(contents); |
+ ASSERT_TRUE(model_client); |
ui_test_utils::NavigateToURL(browser(), GURL("data:text/plain,hello")); |
EXPECT_EQ(security_state::SecurityStateModel::NONE, |
model_client->GetSecurityInfo().security_level); |
+} |
+ |
+IN_PROC_BROWSER_TEST_F(SSLUITest, MarkBlobAsNonSecure) { |
+ scoped_refptr<base::FieldTrial> trial = |
+ base::FieldTrialList::CreateFieldTrial( |
+ "MarkNonSecureAs", |
+ security_state::switches::kMarkNonSecureAsNonSecure); |
+ |
+ content::WebContents* contents = |
+ browser()->tab_strip_model()->GetActiveWebContents(); |
+ ASSERT_TRUE(contents); |
+ |
+ ChromeSecurityStateModelClient* model_client = |
+ ChromeSecurityStateModelClient::FromWebContents(contents); |
+ ASSERT_TRUE(model_client); |
ui_test_utils::NavigateToURL( |
browser(), |