| Index: components/password_manager/content/browser/credential_manager_impl_unittest.cc
|
| diff --git a/components/password_manager/content/browser/credential_manager_impl_unittest.cc b/components/password_manager/content/browser/credential_manager_impl_unittest.cc
|
| index 60448a4999bbaaedc39881c76bafa2f66d0c0220..9628dba80a928e3a163641b1ac9201d250e8bf15 100644
|
| --- a/components/password_manager/content/browser/credential_manager_impl_unittest.cc
|
| +++ b/components/password_manager/content/browser/credential_manager_impl_unittest.cc
|
| @@ -224,7 +224,6 @@ class CredentialManagerImplTest : public content::RenderViewHostTestHarness {
|
| form_.signon_realm = form_.origin.spec();
|
| form_.scheme = autofill::PasswordForm::SCHEME_HTML;
|
| form_.skip_zero_click = false;
|
| - form_.ssl_valid = true;
|
|
|
| affiliated_form1_.username_value = base::ASCIIToUTF16("Affiliated 1");
|
| affiliated_form1_.display_name = base::ASCIIToUTF16("Display Name");
|
| @@ -233,7 +232,6 @@ class CredentialManagerImplTest : public content::RenderViewHostTestHarness {
|
| affiliated_form1_.signon_realm = kTestAndroidRealm1;
|
| affiliated_form1_.scheme = autofill::PasswordForm::SCHEME_HTML;
|
| affiliated_form1_.skip_zero_click = false;
|
| - affiliated_form1_.ssl_valid = true;
|
|
|
| affiliated_form2_.username_value = base::ASCIIToUTF16("Affiliated 2");
|
| affiliated_form2_.display_name = base::ASCIIToUTF16("Display Name");
|
| @@ -242,7 +240,6 @@ class CredentialManagerImplTest : public content::RenderViewHostTestHarness {
|
| affiliated_form2_.signon_realm = kTestAndroidRealm2;
|
| affiliated_form2_.scheme = autofill::PasswordForm::SCHEME_HTML;
|
| affiliated_form2_.skip_zero_click = false;
|
| - affiliated_form2_.ssl_valid = true;
|
|
|
| origin_path_form_.username_value = base::ASCIIToUTF16("Username 2");
|
| origin_path_form_.display_name = base::ASCIIToUTF16("Display Name 2");
|
| @@ -1224,7 +1221,6 @@ TEST_F(CredentialManagerImplTest, GetSynthesizedFormForOrigin) {
|
| EXPECT_EQ(kTestWebOrigin, synthesized.origin.spec());
|
| EXPECT_EQ(kTestWebOrigin, synthesized.signon_realm);
|
| EXPECT_EQ(autofill::PasswordForm::SCHEME_HTML, synthesized.scheme);
|
| - EXPECT_TRUE(synthesized.ssl_valid);
|
| }
|
|
|
| TEST_F(CredentialManagerImplTest, BlacklistPasswordCredential) {
|
| @@ -1249,7 +1245,6 @@ TEST_F(CredentialManagerImplTest, BlacklistPasswordCredential) {
|
| blacklisted.origin = form_.origin;
|
| blacklisted.signon_realm = form_.signon_realm;
|
| blacklisted.type = autofill::PasswordForm::TYPE_API;
|
| - blacklisted.ssl_valid = true;
|
| blacklisted.date_created = passwords[form_.signon_realm][0].date_created;
|
| EXPECT_THAT(passwords[form_.signon_realm], testing::ElementsAre(blacklisted));
|
| }
|
| @@ -1280,7 +1275,6 @@ TEST_F(CredentialManagerImplTest, BlacklistFederatedCredential) {
|
| blacklisted.origin = form_.origin;
|
| blacklisted.signon_realm = blacklisted.origin.spec();
|
| blacklisted.type = autofill::PasswordForm::TYPE_API;
|
| - blacklisted.ssl_valid = true;
|
| blacklisted.date_created =
|
| passwords[blacklisted.signon_realm][0].date_created;
|
| EXPECT_THAT(passwords[blacklisted.signon_realm],
|
| @@ -1292,7 +1286,6 @@ TEST_F(CredentialManagerImplTest, RespectBlacklistingPasswordCredential) {
|
| blacklisted.blacklisted_by_user = true;
|
| blacklisted.origin = form_.origin;
|
| blacklisted.signon_realm = blacklisted.origin.spec();
|
| - blacklisted.ssl_valid = true;
|
| store_->AddLogin(blacklisted);
|
|
|
| CredentialInfo info(form_, CredentialType::CREDENTIAL_TYPE_PASSWORD);
|
| @@ -1312,7 +1305,6 @@ TEST_F(CredentialManagerImplTest, RespectBlacklistingFederatedCredential) {
|
| blacklisted.blacklisted_by_user = true;
|
| blacklisted.origin = form_.origin;
|
| blacklisted.signon_realm = blacklisted.origin.spec();
|
| - blacklisted.ssl_valid = true;
|
| store_->AddLogin(blacklisted);
|
|
|
| form_.federation_origin = url::Origin(GURL("https://example.com/"));
|
|
|