| Index: content/browser/site_per_process_browsertest.cc
|
| diff --git a/content/browser/site_per_process_browsertest.cc b/content/browser/site_per_process_browsertest.cc
|
| index 5ec546b2435cbce6616c97a18d0ca2c4c88bb0d2..266dfeaef8b1ddd4c634f755fdd2718e64d67221 100644
|
| --- a/content/browser/site_per_process_browsertest.cc
|
| +++ b/content/browser/site_per_process_browsertest.cc
|
| @@ -6382,21 +6382,20 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| EXPECT_FALSE(mixed_child->has_committed_real_load());
|
| }
|
|
|
| -// Test that subresources with certificate errors that are NOT redundant
|
| -// with the main page DO get reported to the browser. That is, if
|
| -// https://nonredundant.test frames https://a.com which loads an image
|
| -// with certificate errors, the browser should be notified about the
|
| -// subresource with certificate errors and downgrade the UI
|
| -// appropriately.
|
| +// Test that subresources with certificate errors get reported to the
|
| +// browser. That is, if https://example.test frames https://a.com which
|
| +// loads an image with certificate errors, the browser should be
|
| +// notified about the subresource with certificate errors and downgrade
|
| +// the UI appropriately.
|
| IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| - SubresourceWithNonRedundantCertificateErrors) {
|
| + SubresourceWithCertificateErrors) {
|
| net::EmbeddedTestServer https_server(net::EmbeddedTestServer::TYPE_HTTPS);
|
| https_server.ServeFilesFromSourceDirectory("content/test/data");
|
| ASSERT_TRUE(https_server.Start());
|
| SetupCrossSiteRedirector(&https_server);
|
|
|
| GURL url(https_server.GetURL(
|
| - "nonredundant.test",
|
| + "example.test",
|
| "/mixed-content/non-redundant-cert-error-in-iframe.html"));
|
| EXPECT_TRUE(NavigateToURL(shell(), url));
|
|
|
| @@ -6408,12 +6407,11 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN,
|
| entry->GetSSL().security_style);
|
|
|
| - // The image that the iframe loaded had certificate errors also, and
|
| - // they were different than the certificate errors of the main
|
| - // resource, so the page should be marked as having displayed insecure
|
| - // content.
|
| + // The image that the iframe loaded had certificate errors also, so
|
| + // the page should be marked as having displayed subresources with
|
| + // cert errors.
|
| EXPECT_TRUE(entry->GetSSL().content_status &
|
| - SSLStatus::DISPLAYED_INSECURE_CONTENT);
|
| + SSLStatus::DISPLAYED_CONTENT_WITH_CERT_ERRORS);
|
| }
|
|
|
| // Test setting a cross-origin iframe to display: none.
|
|
|