Index: chrome/browser/ui/website_settings/website_settings_unittest.cc |
diff --git a/chrome/browser/ui/website_settings/website_settings_unittest.cc b/chrome/browser/ui/website_settings/website_settings_unittest.cc |
index a86fbc9d7caa1d4a4ac890c0eafe005099531098..0d37bfc9061f204eaa7bea698ccf9e2812447377 100644 |
--- a/chrome/browser/ui/website_settings/website_settings_unittest.cc |
+++ b/chrome/browser/ui/website_settings/website_settings_unittest.cc |
@@ -25,7 +25,6 @@ |
#include "components/content_settings/core/common/content_settings.h" |
#include "components/content_settings/core/common/content_settings_types.h" |
#include "components/infobars/core/infobar.h" |
-#include "content/public/browser/cert_store.h" |
#include "content/public/common/ssl_status.h" |
#include "device/core/mock_device_client.h" |
#include "device/usb/mock_usb_device.h" |
@@ -67,13 +66,6 @@ int SetSSLCipherSuite(int connection_status, int cipher_suite) { |
return cipher_suite | connection_status; |
} |
-class MockCertStore : public content::CertStore { |
- public: |
- virtual ~MockCertStore() {} |
- MOCK_METHOD2(StoreCert, int(net::X509Certificate*, int)); |
- MOCK_METHOD2(RetrieveCert, bool(int, scoped_refptr<net::X509Certificate>*)); |
-}; |
- |
class MockWebsiteSettingsUI : public WebsiteSettingsUI { |
public: |
virtual ~MockWebsiteSettingsUI() {} |
@@ -87,7 +79,7 @@ class MockWebsiteSettingsUI : public WebsiteSettingsUI { |
class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
public: |
- WebsiteSettingsTest() : cert_id_(0), url_("http://www.example.com") {} |
+ WebsiteSettingsTest() : url_("http://www.example.com") {} |
~WebsiteSettingsTest() override {} |
@@ -98,7 +90,6 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
security_info_.security_level = SecurityStateModel::NONE; |
// Create the certificate. |
- cert_id_ = 1; |
cert_ = |
net::ImportCertFromFile(net::GetTestCertsDirectory(), "ok_cert.pem"); |
ASSERT_TRUE(cert_); |
@@ -106,11 +97,6 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
TabSpecificContentSettings::CreateForWebContents(web_contents()); |
InfoBarService::CreateForWebContents(web_contents()); |
- // Setup the mock cert store. |
- EXPECT_CALL(cert_store_, RetrieveCert(cert_id_, _) ) |
- .Times(AnyNumber()) |
- .WillRepeatedly(DoAll(SetArgPointee<1>(cert_), Return(true))); |
- |
// Setup mock ui. |
mock_ui_.reset(new MockWebsiteSettingsUI()); |
ON_CALL(*mock_ui_, SetPermissionInfo(_, _)) |
@@ -146,8 +132,7 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
void ClearWebsiteSettings() { website_settings_.reset(nullptr); } |
const GURL& url() const { return url_; } |
- MockCertStore* cert_store() { return &cert_store_; } |
- int cert_id() { return cert_id_; } |
+ scoped_refptr<net::X509Certificate> cert() { return cert_; } |
MockWebsiteSettingsUI* mock_ui() { return mock_ui_.get(); } |
const SecurityStateModel::SecurityInfo& security_info() { |
return security_info_; |
@@ -167,7 +152,7 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
if (!website_settings_.get()) { |
website_settings_.reset(new WebsiteSettings( |
mock_ui(), profile(), tab_specific_content_settings(), web_contents(), |
- url(), security_info(), cert_store())); |
+ url(), security_info())); |
} |
return website_settings_.get(); |
} |
@@ -182,9 +167,7 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
device::MockDeviceClient device_client_; |
std::unique_ptr<WebsiteSettings> website_settings_; |
std::unique_ptr<MockWebsiteSettingsUI> mock_ui_; |
- int cert_id_; |
scoped_refptr<net::X509Certificate> cert_; |
- MockCertStore cert_store_; |
GURL url_; |
std::vector<std::unique_ptr<WebsiteSettingsUI::ChosenObjectInfo>> |
last_chosen_object_info_; |
@@ -363,7 +346,7 @@ TEST_F(WebsiteSettingsTest, HTTPConnection) { |
TEST_F(WebsiteSettingsTest, HTTPSConnection) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -507,7 +490,7 @@ TEST_F(WebsiteSettingsTest, InsecureContent) { |
security_info_ = SecurityStateModel::SecurityInfo(); |
security_info_.security_level = test.security_level; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = test.cert_status; |
security_info_.security_bits = 81; // No error if > 80. |
security_info_.mixed_content_status = test.mixed_content_status; |
@@ -538,13 +521,10 @@ TEST_F(WebsiteSettingsTest, HTTPSEVCert) { |
net::X509Certificate::CreateFromBytes( |
reinterpret_cast<const char*>(google_der), |
sizeof(google_der)); |
- int ev_cert_id = 1; |
- EXPECT_CALL(*cert_store(), RetrieveCert(ev_cert_id, _)).WillRepeatedly( |
- DoAll(SetArgPointee<1>(ev_cert), Return(true))); |
security_info_.security_level = SecurityStateModel::NONE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = ev_cert_id; |
+ security_info_.certificate = ev_cert; |
security_info_.cert_status = net::CERT_STATUS_IS_EV; |
security_info_.security_bits = 81; // No error if > 80. |
security_info_.mixed_content_status = |
@@ -569,7 +549,7 @@ TEST_F(WebsiteSettingsTest, HTTPSEVCert) { |
TEST_F(WebsiteSettingsTest, HTTPSRevocationError) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -590,7 +570,7 @@ TEST_F(WebsiteSettingsTest, HTTPSRevocationError) { |
TEST_F(WebsiteSettingsTest, HTTPSConnectionError) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = -1; |
int status = 0; |
@@ -611,7 +591,7 @@ TEST_F(WebsiteSettingsTest, HTTPSConnectionError) { |
TEST_F(WebsiteSettingsTest, HTTPSPolicyCertConnection) { |
security_info_.security_level = SecurityStateModel::SECURITY_POLICY_WARNING; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -632,7 +612,7 @@ TEST_F(WebsiteSettingsTest, HTTPSPolicyCertConnection) { |
TEST_F(WebsiteSettingsTest, HTTPSSHA1Minor) { |
security_info_.security_level = SecurityStateModel::NONE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -659,7 +639,7 @@ TEST_F(WebsiteSettingsTest, HTTPSSHA1Minor) { |
TEST_F(WebsiteSettingsTest, HTTPSSHA1Major) { |
security_info_.security_level = SecurityStateModel::NONE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -687,7 +667,7 @@ TEST_F(WebsiteSettingsTest, HTTPSSHA1Major) { |
TEST_F(WebsiteSettingsTest, UnknownSCTs) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -713,7 +693,7 @@ TEST_F(WebsiteSettingsTest, UnknownSCTs) { |
TEST_F(WebsiteSettingsTest, InvalidSCTs) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -741,7 +721,7 @@ TEST_F(WebsiteSettingsTest, InvalidSCTs) { |
TEST_F(WebsiteSettingsTest, ValidSCTs) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -769,13 +749,10 @@ TEST_F(WebsiteSettingsTest, ValidSCTsEV) { |
scoped_refptr<net::X509Certificate> ev_cert = |
net::X509Certificate::CreateFromBytes( |
reinterpret_cast<const char*>(google_der), sizeof(google_der)); |
- int ev_cert_id = 1; |
- EXPECT_CALL(*cert_store(), RetrieveCert(ev_cert_id, _)) |
- .WillRepeatedly(DoAll(SetArgPointee<1>(ev_cert), Return(true))); |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = ev_cert_id; |
+ security_info_.certificate = ev_cert; |
security_info_.cert_status = net::CERT_STATUS_IS_EV; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -802,7 +779,7 @@ TEST_F(WebsiteSettingsTest, ValidSCTsEV) { |
TEST_F(WebsiteSettingsTest, UnknownAndInvalidSCTs) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |
@@ -829,7 +806,7 @@ TEST_F(WebsiteSettingsTest, UnknownAndInvalidSCTs) { |
TEST_F(WebsiteSettingsTest, ValidAndUnknownSCTs) { |
security_info_.security_level = SecurityStateModel::SECURE; |
security_info_.scheme_is_cryptographic = true; |
- security_info_.cert_id = cert_id(); |
+ security_info_.certificate = cert(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
int status = 0; |