Index: components/security_state/content/web_contents_security_state_model_unittest.cc |
diff --git a/chrome/browser/ssl/chrome_security_state_model_client_unittest.cc b/components/security_state/content/web_contents_security_state_model_unittest.cc |
similarity index 76% |
rename from chrome/browser/ssl/chrome_security_state_model_client_unittest.cc |
rename to components/security_state/content/web_contents_security_state_model_unittest.cc |
index 9a50d7bc05b7e937f30a2843530afc2399932d46..d23d03060f1d283de976c111c425e998d3033dd7 100644 |
--- a/chrome/browser/ssl/chrome_security_state_model_client_unittest.cc |
+++ b/components/security_state/content/web_contents_security_state_model_unittest.cc |
@@ -2,9 +2,9 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
-#include "chrome/browser/ssl/chrome_security_state_model_client.h" |
+#include "components/security_state/content/web_contents_security_state_model.h" |
-#include "components/security_state/security_state_model.h" |
+#include "components/security_state/core/security_state_model.h" |
#include "content/public/browser/security_style_explanation.h" |
#include "content/public/browser/security_style_explanations.h" |
#include "net/cert/cert_status_flags.h" |
@@ -14,10 +14,12 @@ |
namespace { |
+using security_state::WebContentsSecurityStateModel; |
+ |
// Tests that SecurityInfo flags for subresources with certificate |
// errors are reflected in the SecurityStyleExplanations produced by |
-// ChromeSecurityStateModelClient. |
-TEST(ChromeSecurityStateModelClientTest, |
+// WebContentsSecurityStateModel. |
+TEST(WebContentsSecurityStateModelTest, |
GetSecurityStyleForContentWithCertErrors) { |
content::SecurityStyleExplanations explanations; |
security_state::SecurityStateModel::SecurityInfo security_info; |
@@ -26,29 +28,25 @@ TEST(ChromeSecurityStateModelClientTest, |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_TRUE(explanations.ran_content_with_cert_errors); |
EXPECT_TRUE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_RAN; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_TRUE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_TRUE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_NONE; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
} |
@@ -57,7 +55,7 @@ TEST(ChromeSecurityStateModelClientTest, |
// errors are *not* set when the main resource has major certificate |
// errors. If the main resource has certificate errors, it would be |
// duplicative/confusing to also report subresources with cert errors. |
-TEST(ChromeSecurityStateModelClientTest, |
+TEST(WebContentsSecurityStateModelTest, |
SubresourcesAndMainResourceWithMajorCertErrors) { |
content::SecurityStyleExplanations explanations; |
security_state::SecurityStateModel::SecurityInfo security_info; |
@@ -66,29 +64,25 @@ TEST(ChromeSecurityStateModelClientTest, |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_RAN; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_NONE; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
} |
@@ -97,7 +91,7 @@ TEST(ChromeSecurityStateModelClientTest, |
// errors are set when the main resource has only minor certificate |
// errors. Minor errors on the main resource should not hide major |
// errors on subresources. |
-TEST(ChromeSecurityStateModelClientTest, |
+TEST(WebContentsSecurityStateModelTest, |
SubresourcesAndMainResourceWithMinorCertErrors) { |
content::SecurityStyleExplanations explanations; |
security_state::SecurityStateModel::SecurityInfo security_info; |
@@ -106,29 +100,25 @@ TEST(ChromeSecurityStateModelClientTest, |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_TRUE(explanations.ran_content_with_cert_errors); |
EXPECT_TRUE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_RAN; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_TRUE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_DISPLAYED; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_TRUE(explanations.displayed_content_with_cert_errors); |
security_info.content_with_cert_errors_status = |
security_state::SecurityStateModel::CONTENT_STATUS_NONE; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, &explanations); |
EXPECT_FALSE(explanations.ran_content_with_cert_errors); |
EXPECT_FALSE(explanations.displayed_content_with_cert_errors); |
} |
@@ -149,7 +139,7 @@ bool FindSecurityStyleExplanation( |
// Test that connection explanations are formated as expected. Note the strings |
// are not translated and so will be the same in any locale. |
-TEST(ChromeSecurityStateModelClientTest, ConnectionExplanation) { |
+TEST(WebContentsSecurityStateModelTest, ConnectionExplanation) { |
// Test a modern configuration with a key exchange group. |
security_state::SecurityStateModel::SecurityInfo security_info; |
security_info.cert_status = net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; |
@@ -163,8 +153,8 @@ TEST(ChromeSecurityStateModelClientTest, ConnectionExplanation) { |
{ |
content::SecurityStyleExplanations explanations; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, |
+ &explanations); |
content::SecurityStyleExplanation explanation; |
ASSERT_TRUE(FindSecurityStyleExplanation( |
explanations.secure_explanations, "Secure Connection", &explanation)); |
@@ -180,8 +170,8 @@ TEST(ChromeSecurityStateModelClientTest, ConnectionExplanation) { |
security_info.key_exchange_group = 0; |
{ |
content::SecurityStyleExplanations explanations; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, |
+ &explanations); |
content::SecurityStyleExplanation explanation; |
ASSERT_TRUE(FindSecurityStyleExplanation( |
explanations.secure_explanations, "Secure Connection", &explanation)); |
@@ -200,8 +190,8 @@ TEST(ChromeSecurityStateModelClientTest, ConnectionExplanation) { |
security_info.key_exchange_group = 29; // X25519 |
{ |
content::SecurityStyleExplanations explanations; |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, |
+ &explanations); |
content::SecurityStyleExplanation explanation; |
ASSERT_TRUE(FindSecurityStyleExplanation( |
explanations.secure_explanations, "Secure Connection", &explanation)); |
@@ -215,14 +205,14 @@ TEST(ChromeSecurityStateModelClientTest, ConnectionExplanation) { |
// Tests that a security level of HTTP_SHOW_WARNING produces a |
// content::SecurityStyle of UNAUTHENTICATED, with an explanation. |
-TEST(ChromeSecurityStateModelClientTest, HTTPWarning) { |
+TEST(WebContentsSecurityStateModelTest, HTTPWarning) { |
security_state::SecurityStateModel::SecurityInfo security_info; |
content::SecurityStyleExplanations explanations; |
security_info.security_level = |
security_state::SecurityStateModel::HTTP_SHOW_WARNING; |
blink::WebSecurityStyle security_style = |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, |
+ &explanations); |
EXPECT_EQ(blink::WebSecurityStyleUnauthenticated, security_style); |
EXPECT_EQ(1u, explanations.unauthenticated_explanations.size()); |
} |
@@ -230,14 +220,14 @@ TEST(ChromeSecurityStateModelClientTest, HTTPWarning) { |
// Tests that a security level of NONE when there is a password or |
// credit card field on HTTP produces a content::SecurityStyle of |
// UNAUTHENTICATED, with an info explanation. |
-TEST(ChromeSecurityStateModelClientTest, HTTPWarningInFuture) { |
+TEST(WebContentsSecurityStateModelTest, HTTPWarningInFuture) { |
security_state::SecurityStateModel::SecurityInfo security_info; |
content::SecurityStyleExplanations explanations; |
security_info.security_level = security_state::SecurityStateModel::NONE; |
security_info.displayed_private_user_data_input_on_http = true; |
blink::WebSecurityStyle security_style = |
- ChromeSecurityStateModelClient::GetSecurityStyle(security_info, |
- &explanations); |
+ WebContentsSecurityStateModel::GetSecurityStyle(security_info, |
+ &explanations); |
EXPECT_EQ(blink::WebSecurityStyleUnauthenticated, security_style); |
EXPECT_EQ(1u, explanations.info_explanations.size()); |
} |