Index: chrome/browser/ssl/ssl_browser_tests.cc |
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc |
index 203c1a9dc4a3a0851d475e0842316c43b4e4d8ce..9bbf09a3a2d08454c0f0df78ea52cd223036300d 100644 |
--- a/chrome/browser/ssl/ssl_browser_tests.cc |
+++ b/chrome/browser/ssl/ssl_browser_tests.cc |
@@ -1235,11 +1235,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MarkAboutAsNonSecure) { |
EXPECT_EQ(security_state::NONE, security_info.security_level); |
} |
+// Data URLs should always be marked as non-secure. |
IN_PROC_BROWSER_TEST_F(SSLUITest, MarkDataAsNonSecure) { |
- scoped_refptr<base::FieldTrial> trial = |
- base::FieldTrialList::CreateFieldTrial( |
- "MarkNonSecureAs", security_state::switches::kMarkHttpAsDangerous); |
- |
content::WebContents* contents = |
browser()->tab_strip_model()->GetActiveWebContents(); |
ASSERT_TRUE(contents); |
@@ -1251,7 +1248,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MarkDataAsNonSecure) { |
ui_test_utils::NavigateToURL(browser(), GURL("data:text/plain,hello")); |
security_state::SecurityInfo security_info; |
helper->GetSecurityInfo(&security_info); |
- EXPECT_EQ(security_state::NONE, security_info.security_level); |
+ EXPECT_EQ(security_state::HTTP_SHOW_WARNING, security_info.security_level); |
} |
IN_PROC_BROWSER_TEST_F(SSLUITest, MarkBlobAsNonSecure) { |