Chromium Code Reviews| Index: chrome/browser/ssl/security_state_tab_helper_browser_tests.cc |
| diff --git a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc |
| index 3ab197b70de0eb3b8a0c54a9e1331aeb75bb2f5e..f28a529dea48c86b0aea925b54e2fc879a8c0620 100644 |
| --- a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc |
| +++ b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc |
| @@ -1543,6 +1543,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) { |
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| + EXPECT_TRUE(observer.latest_explanations().summary.empty()); |
| // Visit an (otherwise valid) HTTPS page that displays mixed content. |
| std::string replacement_path; |
| @@ -1565,6 +1566,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) { |
| EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic); |
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); |
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| + EXPECT_TRUE(observer.latest_explanations().summary.empty()); |
| EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content); |
| EXPECT_FALSE(mixed_content_explanation.ran_mixed_content); |
| EXPECT_EQ(blink::WebSecurityStyleUnauthenticated, |
| @@ -1590,6 +1592,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) { |
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| + EXPECT_TRUE(observer.latest_explanations().summary.empty()); |
| + EXPECT_TRUE(observer.latest_explanations().summary.empty()); |
|
estark
2016/12/07 01:00:09
redundant
|
| // Before clicking through, navigate to a different page, and then go |
| // back to the interstitial. |
| @@ -1608,6 +1612,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) { |
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| + EXPECT_TRUE(observer.latest_explanations().summary.empty()); |
| // After going back to the interstitial, an event for a broken lock |
| // icon should fire again. |
| @@ -1624,6 +1629,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) { |
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| + EXPECT_TRUE(observer.latest_explanations().summary.empty()); |
| // Since the next expected style is the same as the previous, clear |
| // the observer (to make sure that the event fires twice and we don't |
| @@ -1644,6 +1650,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) { |
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| + EXPECT_TRUE(observer.latest_explanations().summary.empty()); |
| } |
| // Visit a valid HTTPS page, then a broken HTTPS page, and then go back, |