| Index: chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| index 3ab197b70de0eb3b8a0c54a9e1331aeb75bb2f5e..4550183074882a55bf2d6a504fae3b541f2b783f 100644
|
| --- a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| +++ b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| @@ -1543,6 +1543,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary_override.empty());
|
|
|
| // Visit an (otherwise valid) HTTPS page that displays mixed content.
|
| std::string replacement_path;
|
| @@ -1565,6 +1566,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| + EXPECT_TRUE(observer.latest_explanations().summary_override.empty());
|
| EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content);
|
| EXPECT_FALSE(mixed_content_explanation.ran_mixed_content);
|
| EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
|
| @@ -1590,6 +1592,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary_override.empty());
|
|
|
| // Before clicking through, navigate to a different page, and then go
|
| // back to the interstitial.
|
| @@ -1608,6 +1611,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary_override.empty());
|
|
|
| // After going back to the interstitial, an event for a broken lock
|
| // icon should fire again.
|
| @@ -1624,6 +1628,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary_override.empty());
|
|
|
| // Since the next expected style is the same as the previous, clear
|
| // the observer (to make sure that the event fires twice and we don't
|
| @@ -1644,6 +1649,7 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary_override.empty());
|
| }
|
|
|
| // Visit a valid HTTPS page, then a broken HTTPS page, and then go back,
|
|
|