Chromium Code Reviews| Index: content/browser/devtools/protocol/devtools_protocol_browsertest.cc |
| diff --git a/content/browser/devtools/protocol/devtools_protocol_browsertest.cc b/content/browser/devtools/protocol/devtools_protocol_browsertest.cc |
| index d2d04bebfe84e4c04fa38465dad61c91a542fe16..4c885e9c580d212519af41f059c9ede376102687 100644 |
| --- a/content/browser/devtools/protocol/devtools_protocol_browsertest.cc |
| +++ b/content/browser/devtools/protocol/devtools_protocol_browsertest.cc |
| @@ -1274,6 +1274,19 @@ IN_PROC_BROWSER_TEST_F(DevToolsProtocolTest, ShowCertificateViewer) { |
| EXPECT_EQ(transient_entry->GetSSL().certificate, last_shown_certificate()); |
| } |
| +IN_PROC_BROWSER_TEST_F(DevToolsProtocolTest, CertificateError) { |
| + net::EmbeddedTestServer https_server(net::EmbeddedTestServer::TYPE_HTTPS); |
| + https_server.SetSSLConfig(net::EmbeddedTestServer::CERT_EXPIRED); |
| + ASSERT_TRUE(https_server.Start()); |
| + GURL test_url = https_server.GetURL("/devtools/navigation.html"); |
| + |
| + Attach(); |
| + SendCommand("Security.enable", nullptr, true); |
|
Eric Seckler
2017/01/19 11:42:28
I'm considering whether we should add an additiona
irisu
2017/02/07 23:30:19
Done.
|
| + shell()->LoadURL(test_url); |
| + |
| + WaitForNotification("Security.certificateError", true); |
|
Eric Seckler
2017/01/19 11:42:28
Shall we also add tests for handleCertificateError
irisu
2017/02/07 23:30:19
As discussed - this has been a struggle.
|
| +} |
| + |
| IN_PROC_BROWSER_TEST_F(DevToolsProtocolTest, TargetDiscovery) { |
| std::string temp; |
| std::set<std::string> ids; |