| Index: chrome/browser/ssl/ssl_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc
|
| index c5a237cd799edd5a717ca093b45dc4ae631f6d3f..0c18fc96321fa5d3ae503a2ca5449a912e1d0306 100644
|
| --- a/chrome/browser/ssl/ssl_browser_tests.cc
|
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc
|
| @@ -1190,8 +1190,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MarkFileAsNonSecure) {
|
| ASSERT_TRUE(model_client);
|
|
|
| ui_test_utils::NavigateToURL(browser(), GURL("file:///"));
|
| + security_state::SecurityStateModel::SecurityInfo security_info;
|
| + model_client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::NONE,
|
| - model_client->GetSecurityInfo().security_level);
|
| + security_info.security_level);
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(SSLUITest, MarkAboutAsNonSecure) {
|
| @@ -1209,8 +1211,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MarkAboutAsNonSecure) {
|
| ASSERT_TRUE(model_client);
|
|
|
| ui_test_utils::NavigateToURL(browser(), GURL("about:blank"));
|
| + security_state::SecurityStateModel::SecurityInfo security_info;
|
| + model_client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::NONE,
|
| - model_client->GetSecurityInfo().security_level);
|
| + security_info.security_level);
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(SSLUITest, MarkDataAsNonSecure) {
|
| @@ -1228,8 +1232,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MarkDataAsNonSecure) {
|
| ASSERT_TRUE(model_client);
|
|
|
| ui_test_utils::NavigateToURL(browser(), GURL("data:text/plain,hello"));
|
| + security_state::SecurityStateModel::SecurityInfo security_info;
|
| + model_client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::NONE,
|
| - model_client->GetSecurityInfo().security_level);
|
| + security_info.security_level);
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(SSLUITest, MarkBlobAsNonSecure) {
|
| @@ -1249,8 +1255,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MarkBlobAsNonSecure) {
|
| ui_test_utils::NavigateToURL(
|
| browser(),
|
| GURL("blob:chrome://newtab/49a463bb-fac8-476c-97bf-5d7076c3ea1a"));
|
| + security_state::SecurityStateModel::SecurityInfo security_info;
|
| + model_client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::NONE,
|
| - model_client->GetSecurityInfo().security_level);
|
| + security_info.security_level);
|
| }
|
|
|
| #if defined(USE_NSS_CERTS)
|
| @@ -2334,10 +2342,12 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerWithUserException) {
|
| ChromeSecurityStateModelClient* client =
|
| ChromeSecurityStateModelClient::FromWebContents(tab);
|
| ASSERT_TRUE(client);
|
| + security_state::SecurityStateModel::SecurityInfo security_info;
|
| + client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_NONE,
|
| - client->GetSecurityInfo().mixed_content_status);
|
| + security_info.mixed_content_status);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_NONE,
|
| - client->GetSecurityInfo().content_with_cert_errors_status);
|
| + security_info.content_with_cert_errors_status);
|
|
|
| // Navigate to safe page that has Worker loading unsafe content.
|
| // Expect content to load but be marked as auth broken due to running insecure
|
| @@ -2350,10 +2360,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerWithUserException) {
|
| CheckWorkerLoadResult(tab, true); // Worker loads insecure content
|
| CheckAuthenticationBrokenState(tab, CertError::NONE, AuthState::NONE);
|
|
|
| + client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_NONE,
|
| - client->GetSecurityInfo().mixed_content_status);
|
| + security_info.mixed_content_status);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_RAN,
|
| - client->GetSecurityInfo().content_with_cert_errors_status);
|
| + security_info.content_with_cert_errors_status);
|
| }
|
|
|
| // Visits a page with unsafe content and makes sure that if a user exception to
|
| @@ -2367,11 +2378,13 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsWithUserException) {
|
| ChromeSecurityStateModelClient* client =
|
| ChromeSecurityStateModelClient::FromWebContents(tab);
|
| ASSERT_TRUE(client);
|
| + security_state::SecurityStateModel::SecurityInfo security_info;
|
| + client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_NONE,
|
| - client->GetSecurityInfo().mixed_content_status);
|
| + security_info.mixed_content_status);
|
| EXPECT_EQ(
|
| security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN,
|
| - client->GetSecurityInfo().content_with_cert_errors_status);
|
| + security_info.content_with_cert_errors_status);
|
|
|
| int img_width;
|
| EXPECT_TRUE(content::ExecuteScriptAndExtractInt(
|
| @@ -2401,11 +2414,12 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsWithUserException) {
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_COMMON_NAME_INVALID,
|
| AuthState::NONE);
|
|
|
| + client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_NONE,
|
| - client->GetSecurityInfo().mixed_content_status);
|
| + security_info.mixed_content_status);
|
| EXPECT_EQ(
|
| security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN,
|
| - client->GetSecurityInfo().content_with_cert_errors_status);
|
| + security_info.content_with_cert_errors_status);
|
| }
|
|
|
| // Like the test above, but only displaying inactive content (an image).
|
| @@ -2418,10 +2432,12 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeImageWithUserException) {
|
| ChromeSecurityStateModelClient* client =
|
| ChromeSecurityStateModelClient::FromWebContents(tab);
|
| ASSERT_TRUE(client);
|
| + security_state::SecurityStateModel::SecurityInfo security_info;
|
| + client->GetSecurityInfo(&security_info);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_NONE,
|
| - client->GetSecurityInfo().mixed_content_status);
|
| + security_info.mixed_content_status);
|
| EXPECT_EQ(security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED,
|
| - client->GetSecurityInfo().content_with_cert_errors_status);
|
| + security_info.content_with_cert_errors_status);
|
|
|
| int img_width;
|
| EXPECT_TRUE(content::ExecuteScriptAndExtractInt(
|
|
|