| Index: chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| index 90b38fd698643dba56caba34ac9109a8471a9a73..7e2e435251854be14e38d1dabd532a4971b665bc 100644
|
| --- a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| +++ b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| @@ -1544,6 +1544,7 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary.empty());
|
|
|
| // Visit an (otherwise valid) HTTPS page that displays mixed content.
|
| std::string replacement_path;
|
| @@ -1566,6 +1567,7 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| + EXPECT_TRUE(observer.latest_explanations().summary.empty());
|
| EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content);
|
| EXPECT_FALSE(mixed_content_explanation.ran_mixed_content);
|
| EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
|
| @@ -1591,6 +1593,7 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary.empty());
|
|
|
| // Before clicking through, navigate to a different page, and then go
|
| // back to the interstitial.
|
| @@ -1609,6 +1612,7 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary.empty());
|
|
|
| // After going back to the interstitial, an event for a broken lock
|
| // icon should fire again.
|
| @@ -1625,6 +1629,7 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary.empty());
|
|
|
| // Since the next expected style is the same as the previous, clear
|
| // the observer (to make sure that the event fires twice and we don't
|
| @@ -1645,6 +1650,7 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_TRUE(observer.latest_explanations().summary.empty());
|
| }
|
|
|
| // Visit a valid HTTPS page, then a broken HTTPS page, and then go back,
|
|
|