Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(365)

Side by Side Diff: chrome/browser/ssl/security_state_tab_helper_browser_tests.cc

Issue 2588133002: Make form-not-secure controllable as its own separate Finch feature (Closed)
Patch Set: Created 4 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ssl/security_state_tab_helper.h" 5 #include "chrome/browser/ssl/security_state_tab_helper.h"
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/files/file_path.h" 8 #include "base/files/file_path.h"
9 #include "base/macros.h" 9 #include "base/macros.h"
10 #include "base/strings/string_split.h" 10 #include "base/strings/string_split.h"
(...skipping 309 matching lines...) Expand 10 before | Expand all | Expand 10 after
320 320
321 void SetUpOnMainThread() override { 321 void SetUpOnMainThread() override {
322 ASSERT_TRUE(embedded_test_server()->Start()); 322 ASSERT_TRUE(embedded_test_server()->Start());
323 ASSERT_TRUE(https_server_.Start()); 323 ASSERT_TRUE(https_server_.Start());
324 host_resolver()->AddRule("*", embedded_test_server()->GetURL("/").host()); 324 host_resolver()->AddRule("*", embedded_test_server()->GetURL("/").host());
325 SetUpMockCertVerifierForHttpsServer(0, net::OK); 325 SetUpMockCertVerifierForHttpsServer(0, net::OK);
326 } 326 }
327 327
328 void SetUpCommandLine(base::CommandLine* command_line) override { 328 void SetUpCommandLine(base::CommandLine* command_line) override {
329 SecurityStateTabHelperTest::SetUpCommandLine(command_line); 329 SecurityStateTabHelperTest::SetUpCommandLine(command_line);
330 if (GetParam()) { 330 command_line->AppendSwitchASCII(
331 command_line->AppendSwitchASCII( 331 security_state::switches::kMarkHttpAs,
332 security_state::switches::kMarkHttpAs, 332 security_state::switches::kMarkHttpWithPasswordsOrCcWithChip);
333 security_state::switches::
334 kMarkHttpWithPasswordsOrCcWithChipAndFormWarning);
335 } else {
336 command_line->AppendSwitchASCII(
337 security_state::switches::kMarkHttpAs,
338 security_state::switches::kMarkHttpWithPasswordsOrCcWithChip);
339 }
340 } 333 }
341 334
342 private: 335 private:
343 DISALLOW_COPY_AND_ASSIGN(SecurityStateTabHelperTestWithPasswordCcSwitch); 336 DISALLOW_COPY_AND_ASSIGN(SecurityStateTabHelperTestWithPasswordCcSwitch);
344 }; 337 };
345 338
346 class DidChangeVisibleSecurityStateTest : public InProcessBrowserTest { 339 class DidChangeVisibleSecurityStateTest : public InProcessBrowserTest {
347 public: 340 public:
348 DidChangeVisibleSecurityStateTest() 341 DidChangeVisibleSecurityStateTest()
349 : https_server_(net::EmbeddedTestServer::TYPE_HTTPS) { 342 : https_server_(net::EmbeddedTestServer::TYPE_HTTPS) {
(...skipping 549 matching lines...) Expand 10 before | Expand all | Expand 10 after
899 void InjectScript(content::WebContents* contents) { 892 void InjectScript(content::WebContents* contents) {
900 bool js_result = false; 893 bool js_result = false;
901 EXPECT_TRUE(content::ExecuteScriptAndExtractBool( 894 EXPECT_TRUE(content::ExecuteScriptAndExtractBool(
902 contents, "window.domAutomationController.send(true);", &js_result)); 895 contents, "window.domAutomationController.send(true);", &js_result));
903 EXPECT_TRUE(js_result); 896 EXPECT_TRUE(js_result);
904 } 897 }
905 898
906 // Tests that when a visible password field is detected on an HTTP page 899 // Tests that when a visible password field is detected on an HTTP page
907 // load, and when the command-line flag is set, the security level is 900 // load, and when the command-line flag is set, the security level is
908 // downgraded to HTTP_SHOW_WARNING. 901 // downgraded to HTTP_SHOW_WARNING.
909 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 902 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
910 PasswordSecurityLevelDowngraded) { 903 PasswordSecurityLevelDowngraded) {
911 content::WebContents* contents = 904 content::WebContents* contents =
912 browser()->tab_strip_model()->GetActiveWebContents(); 905 browser()->tab_strip_model()->GetActiveWebContents();
913 ASSERT_TRUE(contents); 906 ASSERT_TRUE(contents);
914 907
915 SecurityStateTabHelper* helper = 908 SecurityStateTabHelper* helper =
916 SecurityStateTabHelper::FromWebContents(contents); 909 SecurityStateTabHelper::FromWebContents(contents);
917 ASSERT_TRUE(helper); 910 ASSERT_TRUE(helper);
918 911
919 ui_test_utils::NavigateToURL( 912 ui_test_utils::NavigateToURL(
920 browser(), GetURLWithNonLocalHostname(embedded_test_server(), 913 browser(), GetURLWithNonLocalHostname(embedded_test_server(),
921 "/password/simple_password.html")); 914 "/password/simple_password.html"));
922 InjectScript(contents); 915 InjectScript(contents);
923 security_state::SecurityInfo security_info; 916 security_state::SecurityInfo security_info;
924 helper->GetSecurityInfo(&security_info); 917 helper->GetSecurityInfo(&security_info);
925 EXPECT_EQ(security_state::HTTP_SHOW_WARNING, security_info.security_level); 918 EXPECT_EQ(security_state::HTTP_SHOW_WARNING, security_info.security_level);
926 919
927 content::NavigationEntry* entry = contents->GetController().GetVisibleEntry(); 920 content::NavigationEntry* entry = contents->GetController().GetVisibleEntry();
928 ASSERT_TRUE(entry); 921 ASSERT_TRUE(entry);
929 EXPECT_TRUE(entry->GetSSL().content_status & 922 EXPECT_TRUE(entry->GetSSL().content_status &
930 content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP); 923 content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP);
931 } 924 }
932 925
933 // Tests that when an invisible password field is present on an HTTP page 926 // Tests that when an invisible password field is present on an HTTP page
934 // load, and when the command-line flag is set, the security level is 927 // load, and when the command-line flag is set, the security level is
935 // *not* downgraded to HTTP_SHOW_WARNING. 928 // *not* downgraded to HTTP_SHOW_WARNING.
936 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 929 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
937 PasswordSecurityLevelNotDowngradedForInvisibleInput) { 930 PasswordSecurityLevelNotDowngradedForInvisibleInput) {
938 content::WebContents* contents = 931 content::WebContents* contents =
939 browser()->tab_strip_model()->GetActiveWebContents(); 932 browser()->tab_strip_model()->GetActiveWebContents();
940 ASSERT_TRUE(contents); 933 ASSERT_TRUE(contents);
941 934
942 SecurityStateTabHelper* helper = 935 SecurityStateTabHelper* helper =
943 SecurityStateTabHelper::FromWebContents(contents); 936 SecurityStateTabHelper::FromWebContents(contents);
944 ASSERT_TRUE(helper); 937 ASSERT_TRUE(helper);
945 938
946 ui_test_utils::NavigateToURL( 939 ui_test_utils::NavigateToURL(
947 browser(), 940 browser(),
948 GetURLWithNonLocalHostname(embedded_test_server(), 941 GetURLWithNonLocalHostname(embedded_test_server(),
949 "/password/invisible_password.html")); 942 "/password/invisible_password.html"));
950 InjectScript(contents); 943 InjectScript(contents);
951 security_state::SecurityInfo security_info; 944 security_state::SecurityInfo security_info;
952 helper->GetSecurityInfo(&security_info); 945 helper->GetSecurityInfo(&security_info);
953 EXPECT_EQ(security_state::NONE, security_info.security_level); 946 EXPECT_EQ(security_state::NONE, security_info.security_level);
954 947
955 content::NavigationEntry* entry = contents->GetController().GetVisibleEntry(); 948 content::NavigationEntry* entry = contents->GetController().GetVisibleEntry();
956 ASSERT_TRUE(entry); 949 ASSERT_TRUE(entry);
957 EXPECT_FALSE(entry->GetSSL().content_status & 950 EXPECT_FALSE(entry->GetSSL().content_status &
958 content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP); 951 content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP);
959 } 952 }
960 953
961 // Tests that when a visible password field is detected inside an iframe 954 // Tests that when a visible password field is detected inside an iframe
962 // on an HTTP page load, and when the command-line flag is set, the 955 // on an HTTP page load, and when the command-line flag is set, the
963 // security level is downgraded to HTTP_SHOW_WARNING. 956 // security level is downgraded to HTTP_SHOW_WARNING.
964 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 957 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
965 PasswordSecurityLevelDowngradedFromIframe) { 958 PasswordSecurityLevelDowngradedFromIframe) {
966 content::WebContents* contents = 959 content::WebContents* contents =
967 browser()->tab_strip_model()->GetActiveWebContents(); 960 browser()->tab_strip_model()->GetActiveWebContents();
968 ASSERT_TRUE(contents); 961 ASSERT_TRUE(contents);
969 962
970 SecurityStateTabHelper* helper = 963 SecurityStateTabHelper* helper =
971 SecurityStateTabHelper::FromWebContents(contents); 964 SecurityStateTabHelper::FromWebContents(contents);
972 ASSERT_TRUE(helper); 965 ASSERT_TRUE(helper);
973 966
974 ui_test_utils::NavigateToURL( 967 ui_test_utils::NavigateToURL(
(...skipping 16 matching lines...) Expand all
991 // security level is downgraded to HTTP_SHOW_WARNING, even if the iframe 984 // security level is downgraded to HTTP_SHOW_WARNING, even if the iframe
992 // itself was loaded over HTTPS. 985 // itself was loaded over HTTPS.
993 #if defined(OS_LINUX) 986 #if defined(OS_LINUX)
994 // Flaky on Linux. See https://crbug.com/662485. 987 // Flaky on Linux. See https://crbug.com/662485.
995 #define MAYBE_PasswordSecurityLevelDowngradedFromHttpsIframe \ 988 #define MAYBE_PasswordSecurityLevelDowngradedFromHttpsIframe \
996 DISABLED_PasswordSecurityLevelDowngradedFromHttpsIframe 989 DISABLED_PasswordSecurityLevelDowngradedFromHttpsIframe
997 #else 990 #else
998 #define MAYBE_PasswordSecurityLevelDowngradedFromHttpsIframe \ 991 #define MAYBE_PasswordSecurityLevelDowngradedFromHttpsIframe \
999 PasswordSecurityLevelDowngradedFromHttpsIframe 992 PasswordSecurityLevelDowngradedFromHttpsIframe
1000 #endif 993 #endif
1001 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 994 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
1002 MAYBE_PasswordSecurityLevelDowngradedFromHttpsIframe) { 995 MAYBE_PasswordSecurityLevelDowngradedFromHttpsIframe) {
1003 content::WebContents* contents = 996 content::WebContents* contents =
1004 browser()->tab_strip_model()->GetActiveWebContents(); 997 browser()->tab_strip_model()->GetActiveWebContents();
1005 ASSERT_TRUE(contents); 998 ASSERT_TRUE(contents);
1006 999
1007 SecurityStateTabHelper* helper = 1000 SecurityStateTabHelper* helper =
1008 SecurityStateTabHelper::FromWebContents(contents); 1001 SecurityStateTabHelper::FromWebContents(contents);
1009 ASSERT_TRUE(helper); 1002 ASSERT_TRUE(helper);
1010 1003
1011 // Navigate to an HTTP URL, which loads an iframe using the host and port of 1004 // Navigate to an HTTP URL, which loads an iframe using the host and port of
(...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after
1057 // The appropriate SSLStatus flags should be set, however. 1050 // The appropriate SSLStatus flags should be set, however.
1058 content::NavigationEntry* entry = contents->GetController().GetVisibleEntry(); 1051 content::NavigationEntry* entry = contents->GetController().GetVisibleEntry();
1059 ASSERT_TRUE(entry); 1052 ASSERT_TRUE(entry);
1060 EXPECT_TRUE(entry->GetSSL().content_status & 1053 EXPECT_TRUE(entry->GetSSL().content_status &
1061 content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP); 1054 content::SSLStatus::DISPLAYED_PASSWORD_FIELD_ON_HTTP);
1062 } 1055 }
1063 1056
1064 // Tests that when a visible password field is detected on an HTTPS page 1057 // Tests that when a visible password field is detected on an HTTPS page
1065 // load, and when the command-line flag is set, the security level is 1058 // load, and when the command-line flag is set, the security level is
1066 // *not* downgraded to HTTP_SHOW_WARNING. 1059 // *not* downgraded to HTTP_SHOW_WARNING.
1067 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 1060 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
1068 PasswordSecurityLevelNotDowngradedOnHttps) { 1061 PasswordSecurityLevelNotDowngradedOnHttps) {
1069 content::WebContents* contents = 1062 content::WebContents* contents =
1070 browser()->tab_strip_model()->GetActiveWebContents(); 1063 browser()->tab_strip_model()->GetActiveWebContents();
1071 ASSERT_TRUE(contents); 1064 ASSERT_TRUE(contents);
1072 1065
1073 SecurityStateTabHelper* helper = 1066 SecurityStateTabHelper* helper =
1074 SecurityStateTabHelper::FromWebContents(contents); 1067 SecurityStateTabHelper::FromWebContents(contents);
1075 ASSERT_TRUE(helper); 1068 ASSERT_TRUE(helper);
1076 1069
1077 GURL url = GetURLWithNonLocalHostname(&https_server_, 1070 GURL url = GetURLWithNonLocalHostname(&https_server_,
(...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after
1153 ConsoleWebContentsDelegate* delegate) { 1146 ConsoleWebContentsDelegate* delegate) {
1154 const std::vector<base::string16>& messages = delegate->console_messages(); 1147 const std::vector<base::string16>& messages = delegate->console_messages();
1155 ASSERT_EQ(1u, messages.size()); 1148 ASSERT_EQ(1u, messages.size());
1156 EXPECT_NE(base::string16::npos, 1149 EXPECT_NE(base::string16::npos,
1157 messages[0].find(base::ASCIIToUTF16("warning will be added"))); 1150 messages[0].find(base::ASCIIToUTF16("warning will be added")));
1158 } 1151 }
1159 1152
1160 // Tests that console messages are printed upon a call to 1153 // Tests that console messages are printed upon a call to
1161 // GetSecurityInfo() on an HTTP_SHOW_WARNING page, exactly once per 1154 // GetSecurityInfo() on an HTTP_SHOW_WARNING page, exactly once per
1162 // main-frame navigation. 1155 // main-frame navigation.
1163 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 1156 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
1164 ConsoleMessage) { 1157 ConsoleMessage) {
1165 ConsoleWebContentsDelegate* delegate = new ConsoleWebContentsDelegate( 1158 ConsoleWebContentsDelegate* delegate = new ConsoleWebContentsDelegate(
1166 Browser::CreateParams(browser()->profile())); 1159 Browser::CreateParams(browser()->profile()));
1167 content::WebContents* original_contents = 1160 content::WebContents* original_contents =
1168 browser()->tab_strip_model()->GetActiveWebContents(); 1161 browser()->tab_strip_model()->GetActiveWebContents();
1169 content::WebContents* contents = 1162 content::WebContents* contents =
1170 content::WebContents::Create(content::WebContents::CreateParams( 1163 content::WebContents::Create(content::WebContents::CreateParams(
1171 original_contents->GetBrowserContext())); 1164 original_contents->GetBrowserContext()));
1172 ASSERT_TRUE(contents); 1165 ASSERT_TRUE(contents);
1173 contents->SetDelegate(delegate); 1166 contents->SetDelegate(delegate);
(...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after
1312 1305
1313 helper->GetSecurityInfo(&security_info); 1306 helper->GetSecurityInfo(&security_info);
1314 EXPECT_EQ(security_state::NONE, security_info.security_level); 1307 EXPECT_EQ(security_state::NONE, security_info.security_level);
1315 EXPECT_TRUE(security_info.displayed_credit_card_field_on_http); 1308 EXPECT_TRUE(security_info.displayed_credit_card_field_on_http);
1316 1309
1317 ASSERT_NO_FATAL_FAILURE(CheckForOneFutureHttpWarningConsoleMessage(delegate)); 1310 ASSERT_NO_FATAL_FAILURE(CheckForOneFutureHttpWarningConsoleMessage(delegate));
1318 } 1311 }
1319 1312
1320 // Tests that additional HTTP_SHOW_WARNING console messages are not 1313 // Tests that additional HTTP_SHOW_WARNING console messages are not
1321 // printed after subframe navigations. 1314 // printed after subframe navigations.
1322 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 1315 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
1323 ConsoleMessageNotPrintedForFrameNavigation) { 1316 ConsoleMessageNotPrintedForFrameNavigation) {
1324 ConsoleWebContentsDelegate* delegate = new ConsoleWebContentsDelegate( 1317 ConsoleWebContentsDelegate* delegate = new ConsoleWebContentsDelegate(
1325 Browser::CreateParams(browser()->profile())); 1318 Browser::CreateParams(browser()->profile()));
1326 content::WebContents* original_contents = 1319 content::WebContents* original_contents =
1327 browser()->tab_strip_model()->GetActiveWebContents(); 1320 browser()->tab_strip_model()->GetActiveWebContents();
1328 content::WebContents* contents = 1321 content::WebContents* contents =
1329 content::WebContents::Create(content::WebContents::CreateParams( 1322 content::WebContents::Create(content::WebContents::CreateParams(
1330 original_contents->GetBrowserContext())); 1323 original_contents->GetBrowserContext()));
1331 ASSERT_TRUE(contents); 1324 ASSERT_TRUE(contents);
1332 contents->SetDelegate(delegate); 1325 contents->SetDelegate(delegate);
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after
1393 contents->OnPasswordInputShownOnHttp(); 1386 contents->OnPasswordInputShownOnHttp();
1394 second_message.Run(); 1387 second_message.Run();
1395 1388
1396 helper->GetSecurityInfo(&security_info); 1389 helper->GetSecurityInfo(&security_info);
1397 EXPECT_EQ(security_state::HTTP_SHOW_WARNING, security_info.security_level); 1390 EXPECT_EQ(security_state::HTTP_SHOW_WARNING, security_info.security_level);
1398 ASSERT_NO_FATAL_FAILURE(CheckForOneHttpWarningConsoleMessage(delegate)); 1391 ASSERT_NO_FATAL_FAILURE(CheckForOneHttpWarningConsoleMessage(delegate));
1399 } 1392 }
1400 1393
1401 // Tests that additional HTTP_SHOW_WARNING console messages are not 1394 // Tests that additional HTTP_SHOW_WARNING console messages are not
1402 // printed after pushState navigations. 1395 // printed after pushState navigations.
1403 IN_PROC_BROWSER_TEST_P(SecurityStateTabHelperTestWithPasswordCcSwitch, 1396 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTestWithPasswordCcSwitch,
1404 ConsoleMessageNotPrintedForPushStateNavigation) { 1397 ConsoleMessageNotPrintedForPushStateNavigation) {
1405 ConsoleWebContentsDelegate* delegate = new ConsoleWebContentsDelegate( 1398 ConsoleWebContentsDelegate* delegate = new ConsoleWebContentsDelegate(
1406 Browser::CreateParams(browser()->profile())); 1399 Browser::CreateParams(browser()->profile()));
1407 content::WebContents* original_contents = 1400 content::WebContents* original_contents =
1408 browser()->tab_strip_model()->GetActiveWebContents(); 1401 browser()->tab_strip_model()->GetActiveWebContents();
1409 content::WebContents* contents = 1402 content::WebContents* contents =
1410 content::WebContents::Create(content::WebContents::CreateParams( 1403 content::WebContents::Create(content::WebContents::CreateParams(
1411 original_contents->GetBrowserContext())); 1404 original_contents->GetBrowserContext()));
1412 ASSERT_TRUE(contents); 1405 ASSERT_TRUE(contents);
1413 contents->SetDelegate(delegate); 1406 contents->SetDelegate(delegate);
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after
1467 base::RunLoop second_message; 1460 base::RunLoop second_message;
1468 delegate->set_console_message_callback(second_message.QuitClosure()); 1461 delegate->set_console_message_callback(second_message.QuitClosure());
1469 contents->OnPasswordInputShownOnHttp(); 1462 contents->OnPasswordInputShownOnHttp();
1470 second_message.Run(); 1463 second_message.Run();
1471 1464
1472 helper->GetSecurityInfo(&security_info); 1465 helper->GetSecurityInfo(&security_info);
1473 EXPECT_EQ(security_state::HTTP_SHOW_WARNING, security_info.security_level); 1466 EXPECT_EQ(security_state::HTTP_SHOW_WARNING, security_info.security_level);
1474 ASSERT_NO_FATAL_FAILURE(CheckForOneHttpWarningConsoleMessage(delegate)); 1467 ASSERT_NO_FATAL_FAILURE(CheckForOneHttpWarningConsoleMessage(delegate));
1475 } 1468 }
1476 1469
1477 INSTANTIATE_TEST_CASE_P(SecurityStateTabHelperTestWithPasswordCcSwitch,
1478 SecurityStateTabHelperTestWithPasswordCcSwitch,
1479 // Here 'true' means that the omnibox warning + form
1480 // warning are enabled, and 'false' means just the
1481 // omnibox warning is enabled.
1482 testing::Bool());
1483
1484 // Tests that the security state for a WebContents is up to date when the 1470 // Tests that the security state for a WebContents is up to date when the
1485 // WebContents is inserted into a Browser's TabStripModel. 1471 // WebContents is inserted into a Browser's TabStripModel.
1486 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTest, AddedTab) { 1472 IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTest, AddedTab) {
1487 ASSERT_TRUE(https_server_.Start()); 1473 ASSERT_TRUE(https_server_.Start());
1488 SetUpMockCertVerifierForHttpsServer(0, net::OK); 1474 SetUpMockCertVerifierForHttpsServer(0, net::OK);
1489 1475
1490 content::WebContents* tab = 1476 content::WebContents* tab =
1491 browser()->tab_strip_model()->GetActiveWebContents(); 1477 browser()->tab_strip_model()->GetActiveWebContents();
1492 ASSERT_TRUE(tab); 1478 ASSERT_TRUE(tab);
1493 1479
(...skipping 538 matching lines...) Expand 10 before | Expand all | Expand 10 after
2032 SecurityStateTabHelper* helper = 2018 SecurityStateTabHelper* helper =
2033 SecurityStateTabHelper::FromWebContents(web_contents); 2019 SecurityStateTabHelper::FromWebContents(web_contents);
2034 ASSERT_TRUE(helper); 2020 ASSERT_TRUE(helper);
2035 security_state::SecurityInfo security_info; 2021 security_state::SecurityInfo security_info;
2036 helper->GetSecurityInfo(&security_info); 2022 helper->GetSecurityInfo(&security_info);
2037 EXPECT_EQ(security_state::SECURE, security_info.security_level); 2023 EXPECT_EQ(security_state::SECURE, security_info.security_level);
2038 EXPECT_EQ(kTestSCTStatuses, security_info.sct_verify_statuses); 2024 EXPECT_EQ(kTestSCTStatuses, security_info.sct_verify_statuses);
2039 } 2025 }
2040 2026
2041 } // namespace 2027 } // namespace
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698