Index: chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
diff --git a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
index 19032113412e117a9f2506360a6fcd63ce93c759..e7a2ea081abb37e005fbdaed31ae51130c2851b3 100644 |
--- a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
+++ b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc |
@@ -20,11 +20,11 @@ |
#include "chrome/common/chrome_paths.h" |
#include "chrome/common/chrome_switches.h" |
#include "chrome/common/pref_names.h" |
-#include "chrome/grit/generated_resources.h" |
#include "chrome/test/base/in_process_browser_test.h" |
#include "chrome/test/base/ui_test_utils.h" |
#include "components/prefs/pref_service.h" |
-#include "components/security_state/switches.h" |
+#include "components/security_state/core/switches.h" |
+#include "components/strings/grit/components_strings.h" |
#include "content/public/browser/interstitial_page.h" |
#include "content/public/browser/navigation_controller.h" |
#include "content/public/browser/navigation_entry.h" |
@@ -355,6 +355,8 @@ class SecurityStyleChangedTest : public InProcessBrowserTest { |
DISALLOW_COPY_AND_ASSIGN(SecurityStyleChangedTest); |
}; |
+} // namespace |
+ |
IN_PROC_BROWSER_TEST_F(ChromeSecurityStateModelClientTest, HttpPage) { |
ASSERT_TRUE(embedded_test_server()->Start()); |
ui_test_utils::NavigateToURL( |
@@ -733,6 +735,8 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityStateModelClientTest, BrokenHTTPS) { |
true /* expect cert status error */); |
} |
+namespace { |
+ |
const char kReportURI[] = "https://report-hpkp.test"; |
class PKPModelClientTest : public ChromeSecurityStateModelClientTest { |
@@ -768,6 +772,8 @@ class PKPModelClientTest : public ChromeSecurityStateModelClientTest { |
scoped_refptr<net::URLRequestContextGetter> url_request_context_getter_; |
}; |
+} // namespace |
+ |
IN_PROC_BROWSER_TEST_F(PKPModelClientTest, PKPBypass) { |
content::WebContents* web_contents = |
browser()->tab_strip_model()->GetActiveWebContents(); |
@@ -820,6 +826,8 @@ IN_PROC_BROWSER_TEST_F(PKPModelClientTest, PKPEnforced) { |
browser(), cert.get()); |
} |
+namespace { |
+ |
// Fails requests with ERR_IO_PENDING. Can be used to simulate a navigation |
// that never stops loading. |
class PendingJobInterceptor : public net::URLRequestInterceptor { |
@@ -865,6 +873,8 @@ class SecurityStateModelLoadingTest |
DISALLOW_COPY_AND_ASSIGN(SecurityStateModelLoadingTest); |
}; |
+} // namespace |
+ |
// Tests that navigation state changes cause the security state to be |
// updated. |
IN_PROC_BROWSER_TEST_F(SecurityStateModelLoadingTest, NavigationStateChanges) { |
@@ -915,7 +925,7 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityStateModelClientTest, |
content::SSLStatus::DISPLAYED_CREDIT_CARD_FIELD_ON_HTTP); |
SecurityStateModel::VisibleSecurityState |
visible_security_state_no_sensitive_inputs; |
- model_client->GetVisibleSecurityState( |
+ model_client->security_state_model_->GetVisibleSecurityState( |
&visible_security_state_no_sensitive_inputs); |
EXPECT_FALSE(visible_security_state_no_sensitive_inputs |
.displayed_password_field_on_http); |
@@ -930,7 +940,7 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityStateModelClientTest, |
content::SSLStatus::DISPLAYED_CREDIT_CARD_FIELD_ON_HTTP; |
SecurityStateModel::VisibleSecurityState |
visible_security_state_sensitive_inputs; |
- model_client->GetVisibleSecurityState( |
+ model_client->security_state_model_->GetVisibleSecurityState( |
&visible_security_state_sensitive_inputs); |
EXPECT_TRUE( |
visible_security_state_sensitive_inputs.displayed_password_field_on_http); |
@@ -1119,6 +1129,8 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityStateModelClientTestWithPasswordCcSwitch, |
content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP); |
} |
+namespace { |
+ |
// A Browser subclass that keeps track of messages that have been |
// added to the console. Messages can be retrieved or cleared with |
// console_messages() and ClearConsoleMessages(). The user of this class |
@@ -1184,6 +1196,8 @@ void CheckForOneFutureHttpWarningConsoleMessage( |
messages[0].find(base::ASCIIToUTF16("warning will be added"))); |
} |
+} // namespace |
+ |
// Tests that console messages are printed upon a call to |
// GetSecurityInfo() on an HTTP_SHOW_WARNING page, exactly once per |
// main-frame navigation. |
@@ -1750,6 +1764,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, |
EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
} |
+namespace { |
+ |
// After AddNonsecureUrlHandler() is called, requests to this hostname |
// will use obsolete TLS settings. |
const char kMockNonsecureHostname[] = "example-nonsecure.test"; |
@@ -1864,6 +1880,8 @@ class BrowserTestNonsecureURLRequest : public InProcessBrowserTest { |
DISALLOW_COPY_AND_ASSIGN(BrowserTestNonsecureURLRequest); |
}; |
+} // namespace |
+ |
// Tests that a connection with obsolete TLS settings does not get a |
// secure connection explanation. |
IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest, |
@@ -1911,6 +1929,8 @@ IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest, |
observer.latest_explanations().info_explanations[0].description)); |
} |
+namespace { |
+ |
// After AddSCTUrlHandler() is called, requests to this hostname |
// will be served with Signed Certificate Timestamps. |
const char kMockHostnameWithSCTs[] = "example-scts.test"; |
@@ -2028,6 +2048,8 @@ class BrowserTestURLRequestWithSCTs : public InProcessBrowserTest { |
DISALLOW_COPY_AND_ASSIGN(BrowserTestURLRequestWithSCTs); |
}; |
+} // namespace |
+ |
// Tests that, when Signed Certificate Timestamps (SCTs) are served on a |
// connection, the SCTs verification statuses are exposed on the |
// SecurityInfo. |
@@ -2047,5 +2069,3 @@ IN_PROC_BROWSER_TEST_F(BrowserTestURLRequestWithSCTs, |
EXPECT_EQ(SecurityStateModel::SECURE, security_info.security_level); |
EXPECT_EQ(kTestSCTStatuses, security_info.sct_verify_statuses); |
} |
- |
-} // namespace |