Index: chrome/browser/ssl/ssl_browser_tests.cc |
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc |
index fb8de3188afcb763053dd8dd98fb4b5fc2575673..843e70d99a675787889678bdcd7f71fce05eab79 100644 |
--- a/chrome/browser/ssl/ssl_browser_tests.cc |
+++ b/chrome/browser/ssl/ssl_browser_tests.cc |
@@ -216,7 +216,8 @@ class SSLUITest : public InProcessBrowserTest { |
bool IsShowingWebContentsModalDialog() const { |
return WebContentsModalDialogManager::FromWebContents( |
- chrome::GetActiveWebContents(browser()))->IsShowingDialog(); |
+ browser()->tab_strip_model()->GetActiveWebContents())-> |
+ IsShowingDialog(); |
} |
static bool GetFilePathWithHostAndPortReplacement( |
@@ -332,7 +333,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) { |
ui_test_utils::NavigateToURL(browser(), |
test_server()->GetURL("files/ssl/google.html")); |
- CheckUnauthenticatedState(chrome::GetActiveWebContents(browser())); |
+ CheckUnauthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents()); |
} |
// Visits a page over http which includes broken https resources (status should |
@@ -352,7 +354,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) { |
ui_test_utils::NavigateToURL( |
browser(), test_server()->GetURL(replacement_path)); |
- CheckUnauthenticatedState(chrome::GetActiveWebContents(browser())); |
+ CheckUnauthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents()); |
} |
// http://crbug.com/91745 |
@@ -369,7 +372,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestOKHTTPS) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL("files/ssl/google.html")); |
- CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false); |
+ CheckAuthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents(), false); |
} |
// Visits a page with https error and proceed: |
@@ -379,7 +383,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndProceed) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_expired_.GetURL("files/ssl/google.html")); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, |
true); // Interstitial showing |
@@ -400,7 +404,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndDontProceed) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL("files/ssl/google.html")); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry); |
@@ -444,7 +448,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
// First navigate to an HTTP page. |
ui_test_utils::NavigateToURL(browser(), |
test_server()->GetURL("files/ssl/google.html")); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry); |
@@ -466,7 +470,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
tab->GetRenderViewHost())); |
// We should be back at the original good page. |
- EXPECT_FALSE(chrome::GetActiveWebContents(browser())->GetInterstitialPage()); |
+ EXPECT_FALSE(browser()->tab_strip_model()->GetActiveWebContents()-> |
+ GetInterstitialPage()); |
CheckUnauthenticatedState(tab); |
} |
@@ -480,7 +485,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
// First navigate to an HTTP page. |
ui_test_utils::NavigateToURL(browser(), |
test_server()->GetURL("files/ssl/google.html")); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry); |
@@ -494,7 +499,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
tab->GetController().GoToOffset(-1); |
// We should be back at the original good page. |
- EXPECT_FALSE(chrome::GetActiveWebContents(browser())->GetInterstitialPage()); |
+ EXPECT_FALSE(browser()->tab_strip_model()->GetActiveWebContents()-> |
+ GetInterstitialPage()); |
CheckUnauthenticatedState(tab); |
} |
@@ -506,7 +512,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) { |
// First navigate to two HTTP pages. |
ui_test_utils::NavigateToURL(browser(), |
test_server()->GetURL("files/ssl/google.html")); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
NavigationEntry* entry1 = tab->GetController().GetActiveEntry(); |
ASSERT_TRUE(entry1); |
ui_test_utils::NavigateToURL(browser(), |
@@ -542,7 +548,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoForward) { |
} |
// We should be showing the second good page. |
- EXPECT_FALSE(chrome::GetActiveWebContents(browser())->GetInterstitialPage()); |
+ EXPECT_FALSE(browser()->tab_strip_model()->GetActiveWebContents()-> |
+ GetInterstitialPage()); |
CheckUnauthenticatedState(tab); |
EXPECT_FALSE(tab->GetController().CanGoForward()); |
NavigationEntry* entry4 = tab->GetController().GetActiveEntry(); |
@@ -563,7 +570,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestWSSInvalidCertAndClose) { |
ASSERT_TRUE(wss_server_expired_.Start()); |
// Setup page title observer. |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS")); |
watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL")); |
@@ -605,7 +612,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestWSSInvalidCertAndGoForward) { |
ASSERT_TRUE(wss_server_expired_.Start()); |
// Setup page title observer. |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS")); |
watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL")); |
@@ -672,7 +679,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestWSSClientCert) { |
replacements); |
// Setup page title observer. |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS")); |
watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL")); |
@@ -766,7 +773,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadHTTPSDownload) { |
// Proceed through the SSL interstitial. This doesn't use |
// |ProceedThroughInterstitial| since no page load will commit. |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
ASSERT_TRUE(tab != NULL); |
ASSERT_TRUE(tab->GetInterstitialPage() != NULL); |
{ |
@@ -814,7 +821,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestDisplaysInsecureContent) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
- CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), true); |
+ CheckAuthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents(), true); |
} |
// Visits a page that runs insecure content and tries to suppress the insecure |
@@ -828,8 +836,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, |
ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( |
"files/ssl/page_runs_insecure_content.html")); |
- CheckAuthenticationBrokenState(chrome::GetActiveWebContents(browser()), 0, |
- true, false); |
+ CheckAuthenticationBrokenState( |
+ browser()->tab_strip_model()->GetActiveWebContents(), 0, true, false); |
} |
// Visits a page with unsafe content and make sure that: |
@@ -847,7 +855,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContents) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
// When the bad content is filtered, the state is expected to be |
// authenticated. |
CheckAuthenticatedState(tab, false); |
@@ -891,7 +899,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentLoadedFromJS) { |
ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( |
replacement_path)); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticatedState(tab, false); |
// Load the insecure image. |
@@ -1010,7 +1018,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) { |
// Load original page over HTTP. |
const GURL url_http = test_server()->GetURL(replacement_path); |
ui_test_utils::NavigateToURL(browser(), url_http); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckUnauthenticatedState(tab); |
// Load again but over SSL. It should be marked as displaying insecure |
@@ -1044,7 +1052,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestRunsCachedInsecureContent) { |
// Load original page over HTTP. |
const GURL url_http = test_server()->GetURL(replacement_path); |
ui_test_utils::NavigateToURL(browser(), url_http); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckUnauthenticatedState(tab); |
// Load again but over SSL. It should be marked as displaying insecure |
@@ -1066,7 +1074,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestCNInvalidStickiness) { |
https_server_mismatched_.GetURL("files/ssl/google.html")); |
// We get an interstitial page as a result. |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_COMMON_NAME_INVALID, |
false, true); // Interstitial showing. |
ProceedThroughInterstitial(tab); |
@@ -1104,7 +1112,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_expired_.GetURL("files/ssl/page_with_refs.html")); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, |
true); // Interstitial showing. |
@@ -1139,7 +1147,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) { |
ui_test_utils::NavigateToURL(browser(), |
test_server()->GetURL(replacement_path)); |
- WebContents* tab1 = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab1 = browser()->tab_strip_model()->GetActiveWebContents(); |
// It is probably overkill to add a notification for a popup-opening, let's |
// just poll. |
for (int i = 0; i < 10; i++) { |
@@ -1174,7 +1182,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectBadToGoodHTTPS) { |
ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec())); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, |
true); // Interstitial showing. |
@@ -1194,7 +1202,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectGoodToBadHTTPS) { |
GURL url2 = https_server_expired_.GetURL("files/ssl/google.html"); |
ui_test_utils::NavigateToURL(browser(), GURL(url1.spec() + url2.spec())); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, |
true); // Interstitial showing. |
@@ -1209,7 +1217,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) { |
ASSERT_TRUE(test_server()->Start()); |
ASSERT_TRUE(https_server_.Start()); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
// HTTP redirects to good HTTPS. |
GURL http_url = test_server()->GetURL("server-redirect?"); |
@@ -1226,7 +1234,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToBadHTTPS) { |
ASSERT_TRUE(test_server()->Start()); |
ASSERT_TRUE(https_server_expired_.Start()); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
GURL http_url = test_server()->GetURL("server-redirect?"); |
GURL bad_https_url = |
@@ -1253,18 +1261,21 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPSToHTTP) { |
ui_test_utils::NavigateToURL(browser(), |
GURL(https_url.spec() + http_url.spec())); |
- CheckUnauthenticatedState(chrome::GetActiveWebContents(browser())); |
+ CheckUnauthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents()); |
} |
// Visits a page to which we could not connect (bad port) over http and https |
// and make sure the security style is correct. |
IN_PROC_BROWSER_TEST_F(SSLUITest, TestConnectToBadPort) { |
ui_test_utils::NavigateToURL(browser(), GURL("http://localhost:17")); |
- CheckUnauthenticatedState(chrome::GetActiveWebContents(browser())); |
+ CheckUnauthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents()); |
// Same thing over HTTPS. |
ui_test_utils::NavigateToURL(browser(), GURL("https://localhost:17")); |
- CheckUnauthenticatedState(chrome::GetActiveWebContents(browser())); |
+ CheckUnauthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents()); |
} |
// |
@@ -1287,7 +1298,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestGoodFrameNavigation) { |
https_server_expired_, |
&top_frame_path)); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(top_frame_path)); |
@@ -1387,7 +1398,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestBadFrameNavigation) { |
https_server_expired_, |
&top_frame_path)); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
ui_test_utils::NavigateToURL(browser(), |
https_server_expired_.GetURL(top_frame_path)); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, |
@@ -1426,7 +1437,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestUnauthenticatedFrameNavigation) { |
https_server_expired_, |
&top_frame_path)); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
ui_test_utils::NavigateToURL(browser(), |
test_server()->GetURL(top_frame_path)); |
CheckUnauthenticatedState(tab); |
@@ -1489,7 +1500,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorkerFiltered) { |
&page_with_unsafe_worker_path)); |
ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( |
page_with_unsafe_worker_path)); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
// Expect Worker not to load insecure content. |
CheckWorkerLoadResult(tab, false); |
// The bad content is filtered, expect the state to be authenticated. |
@@ -1504,7 +1515,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestUnsafeContentsInWorker) { |
// the user approves the bad certificate. |
ui_test_utils::NavigateToURL(browser(), |
https_server_expired_.GetURL("files/ssl/blank_page.html")); |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
CheckAuthenticationBrokenState(tab, net::CERT_STATUS_DATE_INVALID, false, |
true); // Interstitial showing |
ProceedThroughInterstitial(tab); |
@@ -1539,7 +1550,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureImage) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
- CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false); |
+ CheckAuthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents(), false); |
} |
// Test that when the browser blocks displaying insecure content (iframes), the |
@@ -1558,7 +1570,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockDisplayingInsecureIframe) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
- CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false); |
+ CheckAuthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents(), false); |
} |
@@ -1578,7 +1591,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITestBlock, TestBlockRunningInsecureContent) { |
ui_test_utils::NavigateToURL(browser(), |
https_server_.GetURL(replacement_path)); |
- CheckAuthenticatedState(chrome::GetActiveWebContents(browser()), false); |
+ CheckAuthenticatedState( |
+ browser()->tab_strip_model()->GetActiveWebContents(), false); |
} |
// Visit a page and establish a WebSocket connection over bad https with |
@@ -1589,7 +1603,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITestIgnoreCertErrors, TestWSS) { |
ASSERT_TRUE(wss_server_expired_.Start()); |
// Setup page title observer. |
- WebContents* tab = chrome::GetActiveWebContents(browser()); |
+ WebContents* tab = browser()->tab_strip_model()->GetActiveWebContents(); |
content::TitleWatcher watcher(tab, ASCIIToUTF16("PASS")); |
watcher.AlsoWaitForTitle(ASCIIToUTF16("FAIL")); |