| Index: content/browser/site_per_process_browsertest.cc
|
| diff --git a/content/browser/site_per_process_browsertest.cc b/content/browser/site_per_process_browsertest.cc
|
| index 9ba45cf787c4e88cfd7a1ab5477774495d8a2960..505f93a075f60345c8a31c9909d983d08040ea5d 100644
|
| --- a/content/browser/site_per_process_browsertest.cc
|
| +++ b/content/browser/site_per_process_browsertest.cc
|
| @@ -33,6 +33,7 @@
|
| #include "content/browser/renderer_host/render_view_host_impl.h"
|
| #include "content/browser/renderer_host/render_widget_host_input_event_router.h"
|
| #include "content/browser/renderer_host/render_widget_host_view_aura.h"
|
| +#include "content/browser/web_contents/web_contents_impl.h"
|
| #include "content/common/child_process_messages.h"
|
| #include "content/common/frame_messages.h"
|
| #include "content/common/input/synthetic_tap_gesture_params.h"
|
| @@ -6288,23 +6289,26 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| ASSERT_TRUE(https_server.Start());
|
| SetupCrossSiteRedirector(&https_server);
|
|
|
| + WebContentsImpl* web_contents =
|
| + static_cast<WebContentsImpl*>(shell()->web_contents());
|
| +
|
| GURL iframe_url(
|
| https_server.GetURL("/mixed-content/basic-passive-in-iframe.html"));
|
| EXPECT_TRUE(NavigateToURL(shell(), iframe_url));
|
| - EXPECT_TRUE(shell()->web_contents()->DisplayedInsecureContent());
|
| + EXPECT_TRUE(web_contents->DisplayedInsecureContent());
|
|
|
| // When the subframe navigates, the WebContents should still be marked
|
| // as having displayed insecure content.
|
| GURL navigate_url(https_server.GetURL("/title1.html"));
|
| - FrameTreeNode* root = web_contents()->GetFrameTree()->root();
|
| + FrameTreeNode* root = web_contents->GetFrameTree()->root();
|
| NavigateFrameToURL(root->child_at(0), navigate_url);
|
| - EXPECT_TRUE(shell()->web_contents()->DisplayedInsecureContent());
|
| + EXPECT_TRUE(web_contents->DisplayedInsecureContent());
|
|
|
| // When the main frame navigates, it should no longer be marked as
|
| // displaying insecure content.
|
| EXPECT_TRUE(
|
| NavigateToURL(shell(), https_server.GetURL("b.com", "/title1.html")));
|
| - EXPECT_FALSE(shell()->web_contents()->DisplayedInsecureContent());
|
| + EXPECT_FALSE(web_contents->DisplayedInsecureContent());
|
| }
|
|
|
| // Tests that, when a parent frame is set to strictly block mixed
|
| @@ -6317,12 +6321,15 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| ASSERT_TRUE(https_server.Start());
|
| SetupCrossSiteRedirector(&https_server);
|
|
|
| + WebContentsImpl* web_contents =
|
| + static_cast<WebContentsImpl*>(shell()->web_contents());
|
| +
|
| GURL iframe_url_with_strict_blocking(https_server.GetURL(
|
| "/mixed-content/basic-passive-in-iframe-with-strict-blocking.html"));
|
| EXPECT_TRUE(NavigateToURL(shell(), iframe_url_with_strict_blocking));
|
| - EXPECT_FALSE(shell()->web_contents()->DisplayedInsecureContent());
|
| + EXPECT_FALSE(web_contents->DisplayedInsecureContent());
|
|
|
| - FrameTreeNode* root = web_contents()->GetFrameTree()->root();
|
| + FrameTreeNode* root = web_contents->GetFrameTree()->root();
|
| EXPECT_EQ(blink::kBlockAllMixedContent,
|
| root->current_replication_state().insecure_request_policy);
|
| EXPECT_EQ(
|
| @@ -6356,12 +6363,15 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| ASSERT_TRUE(https_server.Start());
|
| SetupCrossSiteRedirector(&https_server);
|
|
|
| + WebContentsImpl* web_contents =
|
| + static_cast<WebContentsImpl*>(shell()->web_contents());
|
| +
|
| GURL iframe_url_with_upgrade(https_server.GetURL(
|
| "/mixed-content/basic-passive-in-iframe-with-upgrade.html"));
|
| EXPECT_TRUE(NavigateToURL(shell(), iframe_url_with_upgrade));
|
| - EXPECT_FALSE(shell()->web_contents()->DisplayedInsecureContent());
|
| + EXPECT_FALSE(web_contents->DisplayedInsecureContent());
|
|
|
| - FrameTreeNode* root = web_contents()->GetFrameTree()->root();
|
| + FrameTreeNode* root = web_contents->GetFrameTree()->root();
|
| EXPECT_EQ(blink::kUpgradeInsecureRequests,
|
| root->current_replication_state().insecure_request_policy);
|
| EXPECT_EQ(
|
| @@ -6410,21 +6420,20 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| EXPECT_FALSE(mixed_child->has_committed_real_load());
|
| }
|
|
|
| -// Test that subresources with certificate errors that are NOT redundant
|
| -// with the main page DO get reported to the browser. That is, if
|
| -// https://nonredundant.test frames https://a.com which loads an image
|
| -// with certificate errors, the browser should be notified about the
|
| -// subresource with certificate errors and downgrade the UI
|
| -// appropriately.
|
| +// Test that subresources with certificate errors get reported to the
|
| +// browser. That is, if https://example.test frames https://a.com which
|
| +// loads an image with certificate errors, the browser should be
|
| +// notified about the subresource with certificate errors and downgrade
|
| +// the UI appropriately.
|
| IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| - SubresourceWithNonRedundantCertificateErrors) {
|
| + SubresourceWithCertificateErrors) {
|
| net::EmbeddedTestServer https_server(net::EmbeddedTestServer::TYPE_HTTPS);
|
| https_server.ServeFilesFromSourceDirectory("content/test/data");
|
| ASSERT_TRUE(https_server.Start());
|
| SetupCrossSiteRedirector(&https_server);
|
|
|
| GURL url(https_server.GetURL(
|
| - "nonredundant.test",
|
| + "example.test",
|
| "/mixed-content/non-redundant-cert-error-in-iframe.html"));
|
| EXPECT_TRUE(NavigateToURL(shell(), url));
|
|
|
| @@ -6436,12 +6445,11 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessIgnoreCertErrorsBrowserTest,
|
| EXPECT_EQ(SECURITY_STYLE_AUTHENTICATION_BROKEN,
|
| entry->GetSSL().security_style);
|
|
|
| - // The image that the iframe loaded had certificate errors also, and
|
| - // they were different than the certificate errors of the main
|
| - // resource, so the page should be marked as having displayed insecure
|
| - // content.
|
| + // The image that the iframe loaded had certificate errors also, so
|
| + // the page should be marked as having displayed subresources with
|
| + // cert errors.
|
| EXPECT_TRUE(entry->GetSSL().content_status &
|
| - SSLStatus::DISPLAYED_INSECURE_CONTENT);
|
| + SSLStatus::DISPLAYED_CONTENT_WITH_CERT_ERRORS);
|
| }
|
|
|
| // Test setting a cross-origin iframe to display: none.
|
|
|