Index: chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc b/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
index c877d3e1251e1f027cf550f510544aa4176e32ea..3d13f4125d277ec2bc5df047e89539f0ca18a8d3 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_service_browsertest.cc |
@@ -928,12 +928,17 @@ IN_PROC_BROWSER_TEST_F(SafeBrowsingServiceTest, SubresourceFilterEndToEndTest) { |
&malware_full_hash); |
SetupResponseForUrl(phishing_url, malware_full_hash); |
+ WebContents* web_contents = |
+ browser()->tab_strip_model()->GetActiveWebContents(); |
+ auto* driver_factory = subresource_filter:: |
+ ContentSubresourceFilterDriverFactory::FromWebContents(web_contents); |
+ driver_factory->set_configuration_for_testing( |
+ subresource_filter::GetActiveConfiguration()); |
+ |
// Navigation to a phishing page should trigger an interstitial. If the user |
// clicks through it, the page load should proceed, but with subresource |
// filtering activated. This is verified by probing whether `included_script` |
// that is disallowed above indeed fails to load. |
- WebContents* web_contents = |
- browser()->tab_strip_model()->GetActiveWebContents(); |
EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(phishing_url))); |
ui_test_utils::NavigateToURL(browser(), phishing_url); |
ASSERT_TRUE(Mock::VerifyAndClearExpectations(&observer_)); |
@@ -1996,12 +2001,17 @@ IN_PROC_BROWSER_TEST_F(V4SafeBrowsingServiceTest, |
MarkUrlForPhishingUnexpired(phishing_url, |
ThreatPatternType::SOCIAL_ENGINEERING_ADS); |
+ WebContents* web_contents = |
+ browser()->tab_strip_model()->GetActiveWebContents(); |
+ auto* driver_factory = subresource_filter:: |
+ ContentSubresourceFilterDriverFactory::FromWebContents(web_contents); |
+ driver_factory->set_configuration_for_testing( |
+ subresource_filter::GetActiveConfiguration()); |
+ |
// Navigation to a phishing page should trigger an interstitial. If the user |
// clicks through it, the page load should proceed, but with subresource |
// filtering activated. This is verified by probing whether `included_script` |
// that is disallowed above indeed fails to load. |
- WebContents* web_contents = |
- browser()->tab_strip_model()->GetActiveWebContents(); |
EXPECT_CALL(observer_, OnSafeBrowsingHit(IsUnsafeResourceFor(phishing_url))); |
ui_test_utils::NavigateToURL(browser(), phishing_url); |
ASSERT_TRUE(Mock::VerifyAndClearExpectations(&observer_)); |