| Index: chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| index 3ae0d3e85c65b37e2a40773e8f11e753581ee33e..fc46c55be20db56f5bf7d57e5046a0eab4218cec 100644
|
| --- a/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| +++ b/chrome/browser/ssl/security_state_tab_helper_browser_tests.cc
|
| @@ -123,24 +123,23 @@ void CheckBrokenSecurityStyle(const SecurityStyleTestObserver& observer,
|
| int error,
|
| Browser* browser,
|
| net::X509Certificate* expected_cert) {
|
| - EXPECT_EQ(blink::WebSecurityStyleAuthenticationBroken,
|
| - observer.latest_security_style());
|
| + EXPECT_EQ(blink::WebSecurityStyleInsecure, observer.latest_security_style());
|
|
|
| const content::SecurityStyleExplanations& expired_explanation =
|
| observer.latest_explanations();
|
| - EXPECT_EQ(0u, expired_explanation.unauthenticated_explanations.size());
|
| - ASSERT_EQ(1u, expired_explanation.broken_explanations.size());
|
| + EXPECT_EQ(0u, expired_explanation.neutral_explanations.size());
|
| + ASSERT_EQ(1u, expired_explanation.insecure_explanations.size());
|
| EXPECT_FALSE(expired_explanation.pkp_bypassed);
|
| EXPECT_TRUE(expired_explanation.info_explanations.empty());
|
|
|
| // Check that the summary and description are as expected.
|
| EXPECT_EQ(l10n_util::GetStringUTF8(IDS_CERTIFICATE_CHAIN_ERROR),
|
| - expired_explanation.broken_explanations[0].summary);
|
| + expired_explanation.insecure_explanations[0].summary);
|
|
|
| base::string16 error_string = base::UTF8ToUTF16(net::ErrorToString(error));
|
| EXPECT_EQ(l10n_util::GetStringFUTF8(
|
| IDS_CERTIFICATE_CHAIN_ERROR_DESCRIPTION_FORMAT, error_string),
|
| - expired_explanation.broken_explanations[0].description);
|
| + expired_explanation.insecure_explanations[0].description);
|
|
|
| // Check the associated certificate.
|
| net::X509Certificate* cert = browser->tab_strip_model()
|
| @@ -150,7 +149,7 @@ void CheckBrokenSecurityStyle(const SecurityStyleTestObserver& observer,
|
| ->GetSSL()
|
| .certificate.get();
|
| EXPECT_TRUE(cert->Equals(expected_cert));
|
| - EXPECT_TRUE(expired_explanation.broken_explanations[0].has_certificate);
|
| + EXPECT_TRUE(expired_explanation.insecure_explanations[0].has_certificate);
|
| }
|
|
|
| // Checks that the given |secure_explanations| contains an appropriate
|
| @@ -449,10 +448,10 @@ IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTest, SHA1CertificateBlocked) {
|
|
|
| const content::SecurityStyleExplanations& interstitial_explanation =
|
| observer.latest_explanations();
|
| - ASSERT_EQ(1u, interstitial_explanation.broken_explanations.size());
|
| - ASSERT_EQ(1u, interstitial_explanation.unauthenticated_explanations.size());
|
| + ASSERT_EQ(1u, interstitial_explanation.insecure_explanations.size());
|
| + ASSERT_EQ(1u, interstitial_explanation.neutral_explanations.size());
|
| EXPECT_EQ(l10n_util::GetStringUTF8(IDS_SHA1),
|
| - interstitial_explanation.unauthenticated_explanations[0].summary);
|
| + interstitial_explanation.neutral_explanations[0].summary);
|
|
|
| ProceedThroughInterstitial(
|
| browser()->tab_strip_model()->GetActiveWebContents());
|
| @@ -464,10 +463,10 @@ IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTest, SHA1CertificateBlocked) {
|
|
|
| const content::SecurityStyleExplanations& page_explanation =
|
| observer.latest_explanations();
|
| - ASSERT_EQ(1u, page_explanation.broken_explanations.size());
|
| - ASSERT_EQ(1u, page_explanation.unauthenticated_explanations.size());
|
| + ASSERT_EQ(1u, page_explanation.insecure_explanations.size());
|
| + ASSERT_EQ(1u, page_explanation.neutral_explanations.size());
|
| EXPECT_EQ(l10n_util::GetStringUTF8(IDS_SHA1),
|
| - page_explanation.unauthenticated_explanations[0].summary);
|
| + page_explanation.neutral_explanations[0].summary);
|
| }
|
|
|
| // Test security state for a SHA-1 certificate that is allowed by policy.
|
| @@ -488,10 +487,10 @@ IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTest, SHA1CertificateWarning) {
|
| const content::SecurityStyleExplanations& explanation =
|
| observer.latest_explanations();
|
|
|
| - ASSERT_EQ(0u, explanation.broken_explanations.size());
|
| - ASSERT_EQ(1u, explanation.unauthenticated_explanations.size());
|
| + ASSERT_EQ(0u, explanation.insecure_explanations.size());
|
| + ASSERT_EQ(1u, explanation.neutral_explanations.size());
|
| EXPECT_EQ(l10n_util::GetStringUTF8(IDS_SHA1),
|
| - explanation.unauthenticated_explanations[0].summary);
|
| + explanation.neutral_explanations[0].summary);
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTest, MixedContent) {
|
| @@ -809,10 +808,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStateTabHelperTest,
|
|
|
| // Ensure that WebContentsObservers don't show an incorrect Form Not Secure
|
| // explanation. Regression test for https://crbug.com/691412.
|
| - EXPECT_EQ(0u,
|
| - observer.latest_explanations().unauthenticated_explanations.size());
|
| - EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
|
| - observer.latest_security_style());
|
| + EXPECT_EQ(0u, observer.latest_explanations().neutral_explanations.size());
|
| + EXPECT_EQ(blink::WebSecurityStyleNeutral, observer.latest_security_style());
|
|
|
| content::NavigationEntry* entry = contents->GetController().GetVisibleEntry();
|
| ASSERT_TRUE(entry);
|
| @@ -1513,11 +1510,9 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| // Visit an HTTP url.
|
| GURL http_url(embedded_test_server()->GetURL("/title1.html"));
|
| ui_test_utils::NavigateToURL(browser(), http_url);
|
| - EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
|
| - observer.latest_security_style());
|
| - EXPECT_EQ(0u,
|
| - observer.latest_explanations().unauthenticated_explanations.size());
|
| - EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
|
| + EXPECT_EQ(blink::WebSecurityStyleNeutral, observer.latest_security_style());
|
| + EXPECT_EQ(0u, observer.latest_explanations().neutral_explanations.size());
|
| + EXPECT_EQ(0u, observer.latest_explanations().insecure_explanations.size());
|
| EXPECT_EQ(0u, observer.latest_explanations().secure_explanations.size());
|
| EXPECT_FALSE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| @@ -1534,13 +1529,12 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
|
|
| GURL mixed_content_url(https_server_.GetURL(replacement_path));
|
| ui_test_utils::NavigateToURL(browser(), mixed_content_url);
|
| - EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
|
| - observer.latest_security_style());
|
| + EXPECT_EQ(blink::WebSecurityStyleNeutral, observer.latest_security_style());
|
|
|
| const content::SecurityStyleExplanations& mixed_content_explanation =
|
| observer.latest_explanations();
|
| - ASSERT_EQ(0u, mixed_content_explanation.unauthenticated_explanations.size());
|
| - ASSERT_EQ(0u, mixed_content_explanation.broken_explanations.size());
|
| + ASSERT_EQ(0u, mixed_content_explanation.neutral_explanations.size());
|
| + ASSERT_EQ(0u, mixed_content_explanation.insecure_explanations.size());
|
| CheckSecureExplanations(mixed_content_explanation.secure_explanations,
|
| VALID_CERTIFICATE, browser(),
|
| https_server_.GetCertificate().get());
|
| @@ -1550,9 +1544,9 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| EXPECT_TRUE(observer.latest_explanations().summary.empty());
|
| EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content);
|
| EXPECT_FALSE(mixed_content_explanation.ran_mixed_content);
|
| - EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
|
| + EXPECT_EQ(blink::WebSecurityStyleNeutral,
|
| mixed_content_explanation.displayed_insecure_content_style);
|
| - EXPECT_EQ(blink::WebSecurityStyleAuthenticationBroken,
|
| + EXPECT_EQ(blink::WebSecurityStyleInsecure,
|
| mixed_content_explanation.ran_insecure_content_style);
|
|
|
| // Visit a broken HTTPS url.
|
| @@ -1579,11 +1573,9 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| // back to the interstitial.
|
| GURL valid_https_url(https_server_.GetURL("/title1.html"));
|
| ui_test_utils::NavigateToURL(browser(), valid_https_url);
|
| - EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
|
| - observer.latest_security_style());
|
| - EXPECT_EQ(0u,
|
| - observer.latest_explanations().unauthenticated_explanations.size());
|
| - EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
|
| + EXPECT_EQ(blink::WebSecurityStyleSecure, observer.latest_security_style());
|
| + EXPECT_EQ(0u, observer.latest_explanations().neutral_explanations.size());
|
| + EXPECT_EQ(0u, observer.latest_explanations().insecure_explanations.size());
|
| CheckSecureExplanations(observer.latest_explanations().secure_explanations,
|
| VALID_CERTIFICATE, browser(),
|
| https_server_.GetCertificate().get());
|
| @@ -1661,11 +1653,9 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| // Visit a valid HTTPS url.
|
| GURL valid_https_url(https_server_.GetURL("/title1.html"));
|
| ui_test_utils::NavigateToURL(browser(), valid_https_url);
|
| - EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
|
| - observer.latest_security_style());
|
| - EXPECT_EQ(0u,
|
| - observer.latest_explanations().unauthenticated_explanations.size());
|
| - EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
|
| + EXPECT_EQ(blink::WebSecurityStyleSecure, observer.latest_security_style());
|
| + EXPECT_EQ(0u, observer.latest_explanations().neutral_explanations.size());
|
| + EXPECT_EQ(0u, observer.latest_explanations().insecure_explanations.size());
|
| CheckSecureExplanations(observer.latest_explanations().secure_explanations,
|
| VALID_CERTIFICATE, browser(),
|
| https_server_.GetCertificate().get());
|
| @@ -1711,11 +1701,9 @@ IN_PROC_BROWSER_TEST_F(DidChangeVisibleSecurityStateTest,
|
| chrome::GoBack(browser(), WindowOpenDisposition::CURRENT_TAB);
|
| back_nav_load_observer.Wait();
|
|
|
| - EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
|
| - observer.latest_security_style());
|
| - EXPECT_EQ(0u,
|
| - observer.latest_explanations().unauthenticated_explanations.size());
|
| - EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
|
| + EXPECT_EQ(blink::WebSecurityStyleSecure, observer.latest_security_style());
|
| + EXPECT_EQ(0u, observer.latest_explanations().neutral_explanations.size());
|
| + EXPECT_EQ(0u, observer.latest_explanations().insecure_explanations.size());
|
| CheckSecureExplanations(observer.latest_explanations().secure_explanations,
|
| VALID_CERTIFICATE, browser(),
|
| https_server_.GetCertificate().get());
|
| @@ -1842,8 +1830,9 @@ class BrowserTestNonsecureURLRequest : public InProcessBrowserTest {
|
|
|
| // Tests that a connection with obsolete TLS settings does not get a
|
| // secure connection explanation.
|
| -IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest,
|
| - DidChangeVisibleSecurityStateObserverNonsecureConnection) {
|
| +IN_PROC_BROWSER_TEST_F(
|
| + BrowserTestNonsecureURLRequest,
|
| + DidChangeVisibleSecurityStateObserverObsoleteTLSSettings) {
|
| content::WebContents* web_contents =
|
| browser()->tab_strip_model()->GetActiveWebContents();
|
| SecurityStyleTestObserver observer(web_contents);
|
| @@ -1852,9 +1841,8 @@ IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest,
|
| browser(), GURL(std::string("https://") + kMockNonsecureHostname));
|
|
|
| // The security style of the page doesn't get downgraded for obsolete
|
| - // TLS settings, so it should remain at WebSecurityStyleAuthenticated.
|
| - EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
|
| - observer.latest_security_style());
|
| + // TLS settings, so it should remain at WebSecurityStyleSecure.
|
| + EXPECT_EQ(blink::WebSecurityStyleSecure, observer.latest_security_style());
|
|
|
| // The messages explaining the security style do, however, get
|
| // downgraded: SECURE_PROTOCOL_AND_CIPHERSUITE should not show up when
|
|
|