| Index: chrome/browser/ssl/ssl_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc
|
| index fb8de3188afcb763053dd8dd98fb4b5fc2575673..843e70d99a675787889678bdcd7f71fce05eab79 100644
|
| --- a/chrome/browser/ssl/ssl_browser_tests.cc
|
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc
|
| @@ -216,7 +216,8 @@ class SSLUITest : public InProcessBrowserTest {
|
|
|
| bool IsShowingWebContentsModalDialog() const {
|
| return WebContentsModalDialogManager::FromWebContents(
|
| - chrome::GetActiveWebContents(browser()))->IsShowingDialog();
|
| + browser()->tab_strip_model()->GetActiveWebContents())->
|
| + IsShowingDialog();
|
| }
|
|
|
| static bool GetFilePathWithHostAndPortReplacement(
|
| @@ -332,7 +333,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| test_server()->GetURL("files/ssl/google.html"));
|
|
|
| - CheckUnauthenticatedState(chrome::GetActiveWebContents(browser()));
|
| + CheckUnauthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents());
|
| }
|
|
|
| // Visits a page over http which includes broken https resources (status should
|
| @@ -352,7 +354,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) {
|
| ui_test_utils::NavigateToURL(
|
| browser(), test_server()->GetURL(replacement_path));
|
|
|
| - CheckUnauthenticatedState(chrome::GetActiveWebContents(browser()));
|
| + CheckUnauthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents());
|
| }
|
|
|
| // http://crbug.com/91745
|
| @@ -369,7 +372,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestOKHTTPS) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL("files/ssl/google.html"));
|
|
|
| - CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false);
|
| + CheckAuthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents(), false);
|
| }
|
|
|
| // Visits a page with https error and proceed:
|
| @@ -379,7 +383,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndProceed) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_expired_.GetURL("files/ssl/google.html"));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
|
| true); // Interstitial showing
|
|
|
| @@ -400,7 +404,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndDontProceed) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL("files/ssl/google.html"));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| NavigationEntry* entry = tab->GetController().GetActiveEntry();
|
| ASSERT_TRUE(entry);
|
|
|
| @@ -444,7 +448,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest,
|
| // First navigate to an HTTP page.
|
| ui_test_utils::NavigateToURL(browser(),
|
| test_server()->GetURL("files/ssl/google.html"));
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| NavigationEntry* entry = tab->GetController().GetActiveEntry();
|
| ASSERT_TRUE(entry);
|
|
|
| @@ -466,7 +470,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest,
|
| tab->GetRenderViewHost()));
|
|
|
| // We should be back at the original good page.
|
| - EXPECT_FALSE(chrome::GetActiveWebContents(browser())->GetInterstitialPage());
|
| + EXPECT_FALSE(browser()->tab_strip_model()->GetActiveWebContents()->
|
| + GetInterstitialPage());
|
| CheckUnauthenticatedState(tab);
|
| }
|
|
|
| @@ -480,7 +485,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest,
|
| // First navigate to an HTTP page.
|
| ui_test_utils::NavigateToURL(browser(),
|
| test_server()->GetURL("files/ssl/google.html"));
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| NavigationEntry* entry = tab->GetController().GetActiveEntry();
|
| ASSERT_TRUE(entry);
|
|
|
| @@ -494,7 +499,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest,
|
| tab->GetController().GoToOffset(-1);
|
|
|
| // We should be back at the original good page.
|
| - EXPECT_FALSE(chrome::GetActiveWebContents(browser())->GetInterstitialPage());
|
| + EXPECT_FALSE(browser()->tab_strip_model()->GetActiveWebContents()->
|
| + GetInterstitialPage());
|
| CheckUnauthenticatedState(tab);
|
| }
|
|
|
| @@ -506,7 +512,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) {
|
| // First navigate to two HTTP pages.
|
| ui_test_utils::NavigateToURL(browser(),
|
| test_server()->GetURL("files/ssl/google.html"));
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| NavigationEntry* entry1 = tab->GetController().GetActiveEntry();
|
| ASSERT_TRUE(entry1);
|
| ui_test_utils::NavigateToURL(browser(),
|
| @@ -542,7 +548,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) {
|
| }
|
|
|
| // We should be showing the second good page.
|
| - EXPECT_FALSE(chrome::GetActiveWebContents(browser())->GetInterstitialPage());
|
| + EXPECT_FALSE(browser()->tab_strip_model()->GetActiveWebContents()->
|
| + GetInterstitialPage());
|
| CheckUnauthenticatedState(tab);
|
| EXPECT_FALSE(tab->GetController().CanGoForward());
|
| NavigationEntry* entry4 = tab->GetController().GetActiveEntry();
|
| @@ -563,7 +570,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestWSSInvalidCertAndClose) {
|
| ASSERT_TRUE(wss_server_expired_.Start());
|
|
|
| // Setup page title observer.
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS"));
|
| watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL"));
|
|
|
| @@ -605,7 +612,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestWSSInvalidCertAndGoForward) {
|
| ASSERT_TRUE(wss_server_expired_.Start());
|
|
|
| // Setup page title observer.
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS"));
|
| watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL"));
|
|
|
| @@ -672,7 +679,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestWSSClientCert) {
|
| replacements);
|
|
|
| // Setup page title observer.
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS"));
|
| watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL"));
|
|
|
| @@ -766,7 +773,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadHTTPSDownload) {
|
|
|
| // Proceed through the SSL interstitial. This doesn't use
|
| // |ProceedThroughInterstitial| since no page load will commit.
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| ASSERT_TRUE(tab != NULL);
|
| ASSERT_TRUE(tab->GetInterstitialPage() != NULL);
|
| {
|
| @@ -814,7 +821,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestDisplaysInsecureContent) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL(replacement_path));
|
|
|
| - CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), true);
|
| + CheckAuthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents(), true);
|
| }
|
|
|
| // Visits a page that runs insecure content and tries to suppress the insecure
|
| @@ -828,8 +836,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest,
|
| ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
|
| "files/ssl/page_runs_insecure_content.html"));
|
|
|
| - CheckAuthenticationBrokenState(chrome::GetActiveWebContents(browser()), 0,
|
| - true, false);
|
| + CheckAuthenticationBrokenState(
|
| + browser()->tab_strip_model()->GetActiveWebContents(), 0, true, false);
|
| }
|
|
|
| // Visits a page with unsafe content and make sure that:
|
| @@ -847,7 +855,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL(replacement_path));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| // When the bad content is filtered, the state is expected to be
|
| // authenticated.
|
| CheckAuthenticatedState(tab, false);
|
| @@ -891,7 +899,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentLoadedFromJS) {
|
| ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
|
| replacement_path));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckAuthenticatedState(tab, false);
|
|
|
| // Load the insecure image.
|
| @@ -1010,7 +1018,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) {
|
| // Load original page over HTTP.
|
| const GURL url_http = test_server()->GetURL(replacement_path);
|
| ui_test_utils::NavigateToURL(browser(), url_http);
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckUnauthenticatedState(tab);
|
|
|
| // Load again but over SSL. It should be marked as displaying insecure
|
| @@ -1044,7 +1052,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestRunsCachedInsecureContent) {
|
| // Load original page over HTTP.
|
| const GURL url_http = test_server()->GetURL(replacement_path);
|
| ui_test_utils::NavigateToURL(browser(), url_http);
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckUnauthenticatedState(tab);
|
|
|
| // Load again but over SSL. It should be marked as displaying insecure
|
| @@ -1066,7 +1074,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestCNInvalidStickiness) {
|
| https_server_mismatched_.GetURL("files/ssl/google.html"));
|
|
|
| // We get an interstitial page as a result.
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_COMMON_NAME_INVALID,
|
| false, true); // Interstitial showing.
|
| ProceedThroughInterstitial(tab);
|
| @@ -1104,7 +1112,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_expired_.GetURL("files/ssl/page_with_refs.html"));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
|
| true); // Interstitial showing.
|
|
|
| @@ -1139,7 +1147,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| test_server()->GetURL(replacement_path));
|
|
|
| - WebContents* tab1 = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab1 = browser()->tab_strip_model()->GetActiveWebContents();
|
| // It is probably overkill to add a notification for a popup-opening, let's
|
| // just poll.
|
| for (int i = 0; i < 10; i++) {
|
| @@ -1174,7 +1182,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectBadToGoodHTTPS) {
|
|
|
| ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec()));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
|
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
|
| true); // Interstitial showing.
|
| @@ -1194,7 +1202,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectGoodToBadHTTPS) {
|
| GURL url2 = https_server_expired_.GetURL("files/ssl/google.html");
|
| ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec()));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
|
| true); // Interstitial showing.
|
|
|
| @@ -1209,7 +1217,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) {
|
| ASSERT_TRUE(test_server()->Start());
|
| ASSERT_TRUE(https_server_.Start());
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
|
|
| // HTTP redirects to good HTTPS.
|
| GURL http_url = test_server()->GetURL("server-redirect?");
|
| @@ -1226,7 +1234,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToBadHTTPS) {
|
| ASSERT_TRUE(test_server()->Start());
|
| ASSERT_TRUE(https_server_expired_.Start());
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
|
|
| GURL http_url = test_server()->GetURL("server-redirect?");
|
| GURL bad_https_url =
|
| @@ -1253,18 +1261,21 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) {
|
|
|
| ui_test_utils::NavigateToURL(browser(),
|
| GURL(https_url.spec() + http_url.spec()));
|
| - CheckUnauthenticatedState(chrome::GetActiveWebContents(browser()));
|
| + CheckUnauthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents());
|
| }
|
|
|
| // Visits a page to which we could not connect (bad port) over http and https
|
| // and make sure the security style is correct.
|
| IN_PROC_BROWSER_TEST_F(SSLUITest, TestConnectToBadPort) {
|
| ui_test_utils::NavigateToURL(browser(), GURL("http://localhost:17"));
|
| - CheckUnauthenticatedState(chrome::GetActiveWebContents(browser()));
|
| + CheckUnauthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents());
|
|
|
| // Same thing over HTTPS.
|
| ui_test_utils::NavigateToURL(browser(), GURL("https://localhost:17"));
|
| - CheckUnauthenticatedState(chrome::GetActiveWebContents(browser()));
|
| + CheckUnauthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents());
|
| }
|
|
|
| //
|
| @@ -1287,7 +1298,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) {
|
| https_server_expired_,
|
| &top_frame_path));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL(top_frame_path));
|
|
|
| @@ -1387,7 +1398,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) {
|
| https_server_expired_,
|
| &top_frame_path));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_expired_.GetURL(top_frame_path));
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
|
| @@ -1426,7 +1437,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnauthenticatedFrameNavigation) {
|
| https_server_expired_,
|
| &top_frame_path));
|
|
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| ui_test_utils::NavigateToURL(browser(),
|
| test_server()->GetURL(top_frame_path));
|
| CheckUnauthenticatedState(tab);
|
| @@ -1489,7 +1500,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerFiltered) {
|
| &page_with_unsafe_worker_path));
|
| ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
|
| page_with_unsafe_worker_path));
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| // Expect Worker not to load insecure content.
|
| CheckWorkerLoadResult(tab, false);
|
| // The bad content is filtered, expect the state to be authenticated.
|
| @@ -1504,7 +1515,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorker) {
|
| // the user approves the bad certificate.
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_expired_.GetURL("files/ssl/blank_page.html"));
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false,
|
| true); // Interstitial showing
|
| ProceedThroughInterstitial(tab);
|
| @@ -1539,7 +1550,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureImage) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL(replacement_path));
|
|
|
| - CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false);
|
| + CheckAuthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents(), false);
|
| }
|
|
|
| // Test that when the browser blocks displaying insecure content (iframes), the
|
| @@ -1558,7 +1570,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureIframe) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL(replacement_path));
|
|
|
| - CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false);
|
| + CheckAuthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents(), false);
|
| }
|
|
|
|
|
| @@ -1578,7 +1591,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockRunningInsecureContent) {
|
| ui_test_utils::NavigateToURL(browser(),
|
| https_server_.GetURL(replacement_path));
|
|
|
| - CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false);
|
| + CheckAuthenticatedState(
|
| + browser()->tab_strip_model()->GetActiveWebContents(), false);
|
| }
|
|
|
| // Visit a page and establish a WebSocket connection over bad https with
|
| @@ -1589,7 +1603,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreCertErrors, TestWSS) {
|
| ASSERT_TRUE(wss_server_expired_.Start());
|
|
|
| // Setup page title observer.
|
| - WebContents* tab = chrome::GetActiveWebContents(browser());
|
| + WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents();
|
| content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS"));
|
| watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL"));
|
|
|
|
|