Index: chrome/browser/ssl/ssl_browser_tests.cc |
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc |
index 155cd252ec7b9b22483a96c28aa18c6b820d76ee..68405e7ac23441f6e9ff6804f8be9396d2d9aecd 100644 |
--- a/chrome/browser/ssl/ssl_browser_tests.cc |
+++ b/chrome/browser/ssl/ssl_browser_tests.cc |
@@ -154,11 +154,7 @@ |
DISPLAYED_INSECURE_CONTENT = 1 << 0, |
RAN_INSECURE_CONTENT = 1 << 1, |
SHOWING_INTERSTITIAL = 1 << 2, |
- SHOWING_ERROR = 1 << 3, |
- // Useful when a favicon load may or may not have finished loading, to avoid |
- // checking if a page displayed insecure content. |
- // TODO(estark): remove this once http://crbug.com/634171 is fixed. |
- DONT_CHECK_DISPLAYED_INSECURE_CONTENT = 1 << 4, |
+ SHOWING_ERROR = 1 << 3 |
}; |
void Check(const NavigationEntry& entry, int expected_authentication_state) { |
@@ -172,16 +168,11 @@ |
entry.GetPageType()); |
} |
- if (!(expected_authentication_state & |
- AuthState::DONT_CHECK_DISPLAYED_INSECURE_CONTENT)) { |
- bool displayed_insecure_content = |
- !!(entry.GetSSL().content_status & |
- SSLStatus::DISPLAYED_INSECURE_CONTENT); |
- EXPECT_EQ( |
- !!(expected_authentication_state & |
- AuthState::DISPLAYED_INSECURE_CONTENT), |
- displayed_insecure_content); |
- } |
+ bool displayed_insecure_content = |
+ !!(entry.GetSSL().content_status & SSLStatus::DISPLAYED_INSECURE_CONTENT); |
+ EXPECT_EQ( |
+ !!(expected_authentication_state & AuthState::DISPLAYED_INSECURE_CONTENT), |
+ displayed_insecure_content); |
bool ran_insecure_content = |
!!(entry.GetSSL().content_status & SSLStatus::RAN_INSECURE_CONTENT); |
@@ -1831,6 +1822,14 @@ |
tab, net::CERT_STATUS_COMMON_NAME_INVALID, AuthState::NONE); |
} |
+#if defined(OS_CHROMEOS) |
+// This test seems to be flaky and hang on chromiumos. |
+// http://crbug.com/84419 |
+#define MAYBE_TestRefNavigation DISABLED_TestRefNavigation |
+#else |
+#define MAYBE_TestRefNavigation TestRefNavigation |
+#endif |
+ |
// Test that navigating to a #ref does not change a bad security state. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) { |
ASSERT_TRUE(https_server_expired_.Start()); |
@@ -1852,8 +1851,7 @@ |
browser(), https_server_expired_.GetURL("/ssl/page_with_refs.html#jp")); |
CheckAuthenticationBrokenState( |
- tab, net::CERT_STATUS_DATE_INVALID, |
- AuthState::DONT_CHECK_DISPLAYED_INSECURE_CONTENT); |
+ tab, net::CERT_STATUS_DATE_INVALID, AuthState::NONE); |
} |
// Tests that closing a page that opened a pop-up with an interstitial does not |
@@ -2171,8 +2169,7 @@ |
// We should still be authentication broken. |
CheckAuthenticationBrokenState( |
- tab, net::CERT_STATUS_DATE_INVALID, |
- AuthState::DONT_CHECK_DISPLAYED_INSECURE_CONTENT); |
+ tab, net::CERT_STATUS_DATE_INVALID, AuthState::NONE); |
} |
// From an HTTP top frame, navigate to good and bad HTTPS (security state should |
@@ -2287,10 +2284,8 @@ |
ui_test_utils::NavigateToURL( |
browser(), https_server_.GetURL(page_with_unsafe_worker_path)); |
CheckWorkerLoadResult(tab, true); // Worker loads insecure content |
- CheckAuthenticationBrokenState( |
- tab, CertError::NONE, |
- AuthState::RAN_INSECURE_CONTENT | |
- AuthState::DONT_CHECK_DISPLAYED_INSECURE_CONTENT); |
+ CheckAuthenticationBrokenState(tab, CertError::NONE, |
+ AuthState::RAN_INSECURE_CONTENT); |
} |
// Visits a page with unsafe content and makes sure that if a user exception to |
@@ -2329,9 +2324,8 @@ |
EXPECT_TRUE(content::ExecuteScriptAndExtractBool( |
tab, "window.domAutomationController.send(IsFooSet());", &js_result)); |
EXPECT_TRUE(js_result); |
- CheckAuthenticationBrokenState( |
- tab, net::CERT_STATUS_COMMON_NAME_INVALID, |
- AuthState::DONT_CHECK_DISPLAYED_INSECURE_CONTENT); |
+ CheckAuthenticationBrokenState(tab, net::CERT_STATUS_COMMON_NAME_INVALID, |
+ AuthState::NONE); |
} |
// Like the test above, but only displaying inactive content (an image). |