| Index: chrome/browser/ssl/ssl_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc
|
| index d0c359295707b2b473d5f6a88d20f1dacf6cd7ad..f2e1f136e347e095879c515fe4f1e87a6b86a121 100644
|
| --- a/chrome/browser/ssl/ssl_browser_tests.cc
|
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc
|
| @@ -840,7 +840,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) {
|
| test_server()->host_port_pair(),
|
| &replacement_path));
|
|
|
| - // Create a new tab in the same process.
|
| + // Create a new tab in the same process. Using a NEW_FOREGROUND_TAB
|
| + // disposition won't usually stay in the same process, but this works
|
| + // because we are using process-per-site in SetUpCommandLine.
|
| GURL url = https_server_.GetURL(replacement_path);
|
| browser::NavigateParams params(
|
| browser(), url, content::PAGE_TRANSITION_TYPED);
|
| @@ -853,6 +855,10 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) {
|
| TabContents* tab2 = params.target_contents;
|
| observer.Wait();
|
|
|
| + // Both tabs should have the same process.
|
| + EXPECT_EQ(tab1->web_contents()->GetRenderProcessHost(),
|
| + tab2->web_contents()->GetRenderProcessHost());
|
| +
|
| // The new tab has insecure content.
|
| CheckAuthenticationBrokenState(tab2->web_contents(), 0, true, false);
|
|
|
|
|