| Index: chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| diff --git a/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc b/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| index 70fa4591eb1c9a597b14fc07ced85516d4dd781e..568dd94345bd961bbcc7690d061bc223ea6a91dc 100644
|
| --- a/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| +++ b/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| @@ -196,21 +196,73 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest,
|
| Profile* profile = Profile::FromBrowserContext(tab->GetBrowserContext());
|
| content::SSLHostStateDelegate* state = profile->GetSSLHostStateDelegate();
|
|
|
| - EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 42));
|
| - EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 191));
|
| - EXPECT_FALSE(state->DidHostRunInsecureContent("example.com", 42));
|
| -
|
| - state->HostRanInsecureContent("www.google.com", 42);
|
| -
|
| - EXPECT_TRUE(state->DidHostRunInsecureContent("www.google.com", 42));
|
| - EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 191));
|
| - EXPECT_FALSE(state->DidHostRunInsecureContent("example.com", 42));
|
| -
|
| - state->HostRanInsecureContent("example.com", 42);
|
| -
|
| - EXPECT_TRUE(state->DidHostRunInsecureContent("www.google.com", 42));
|
| - EXPECT_FALSE(state->DidHostRunInsecureContent("www.google.com", 191));
|
| - EXPECT_TRUE(state->DidHostRunInsecureContent("example.com", 42));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 42,
|
| + content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 191,
|
| + content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
|
| +
|
| + // Mark a site as MIXED_CONTENT and check that only that host/child id
|
| + // is affected, and only for MIXED_CONTENT (not for
|
| + // CERT_ERRORS_CONTENT);
|
| + state->HostRanInsecureContent("www.google.com", 42,
|
| + content::SSLHostStateDelegate::MIXED_CONTENT);
|
| +
|
| + EXPECT_TRUE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 42,
|
| + content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| +
|
| + // Mark another site as MIXED_CONTENT, and check that that host/child
|
| + // id is affected (for MIXED_CONTENT only), and that the previously
|
| + // host/child id is still marked as MIXED_CONTENT.
|
| + state->HostRanInsecureContent("example.com", 42,
|
| + content::SSLHostStateDelegate::MIXED_CONTENT);
|
| +
|
| + EXPECT_TRUE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_TRUE(state->DidHostRunInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
|
| +
|
| + // Mark a MIXED_CONTENT host/child id as CERT_ERRORS_CONTENT also.
|
| + state->HostRanInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::CERT_ERRORS_CONTENT);
|
| +
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_TRUE(state->DidHostRunInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| + EXPECT_TRUE(state->DidHostRunInsecureContent(
|
| + "example.com", 42, content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
|
| +
|
| + // Mark a non-MIXED_CONTENT host as CERT_ERRORS_CONTENT.
|
| + state->HostRanInsecureContent(
|
| + "www.google.com", 191,
|
| + content::SSLHostStateDelegate::CERT_ERRORS_CONTENT);
|
| +
|
| + EXPECT_TRUE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 191,
|
| + content::SSLHostStateDelegate::CERT_ERRORS_CONTENT));
|
| + EXPECT_FALSE(state->DidHostRunInsecureContent(
|
| + "www.google.com", 191, content::SSLHostStateDelegate::MIXED_CONTENT));
|
| }
|
|
|
| // Test the migration code needed as a result of changing how the content
|
|
|