Index: chrome/browser/net/transport_security_persister_unittest.cc |
diff --git a/chrome/browser/net/transport_security_persister_unittest.cc b/chrome/browser/net/transport_security_persister_unittest.cc |
index 54555986e017d0d88a21f7d33e8361b2634cdbb4..075b29efecd60c3aa91022fa60d99496945d00dc 100644 |
--- a/chrome/browser/net/transport_security_persister_unittest.cc |
+++ b/chrome/browser/net/transport_security_persister_unittest.cc |
@@ -67,7 +67,7 @@ TEST_F(TransportSecurityPersisterTest, SerializeData2) { |
const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); |
static const char kYahooDomain[] = "yahoo.com"; |
- EXPECT_FALSE(state_.GetDomainState(kYahooDomain, true, &domain_state)); |
+ EXPECT_FALSE(state_.GetDomainState(kYahooDomain, true, true, &domain_state)); |
bool include_subdomains = true; |
state_.AddHSTS(kYahooDomain, expiry, include_subdomains); |
@@ -77,20 +77,22 @@ TEST_F(TransportSecurityPersisterTest, SerializeData2) { |
EXPECT_TRUE(persister_->SerializeData(&output)); |
EXPECT_TRUE(persister_->LoadEntries(output, &dirty)); |
- EXPECT_TRUE(state_.GetDomainState(kYahooDomain, true, &domain_state)); |
+ EXPECT_TRUE(state_.GetDomainState(kYahooDomain, true, true, &domain_state)); |
EXPECT_EQ(domain_state.upgrade_mode, |
TransportSecurityState::DomainState::MODE_FORCE_HTTPS); |
- EXPECT_TRUE(state_.GetDomainState("foo.yahoo.com", true, &domain_state)); |
+ EXPECT_TRUE(state_.GetDomainState("foo.yahoo.com", true, true, |
+ &domain_state)); |
EXPECT_EQ(domain_state.upgrade_mode, |
TransportSecurityState::DomainState::MODE_FORCE_HTTPS); |
- EXPECT_TRUE(state_.GetDomainState("foo.bar.yahoo.com", true, &domain_state)); |
+ EXPECT_TRUE(state_.GetDomainState("foo.bar.yahoo.com", true, true, |
+ &domain_state)); |
EXPECT_EQ(domain_state.upgrade_mode, |
TransportSecurityState::DomainState::MODE_FORCE_HTTPS); |
EXPECT_TRUE(state_.GetDomainState("foo.bar.baz.yahoo.com", true, |
- &domain_state)); |
+ true, &domain_state)); |
EXPECT_EQ(domain_state.upgrade_mode, |
TransportSecurityState::DomainState::MODE_FORCE_HTTPS); |
- EXPECT_FALSE(state_.GetDomainState("com", true, &domain_state)); |
+ EXPECT_FALSE(state_.GetDomainState("com", true, true, &domain_state)); |
} |
TEST_F(TransportSecurityPersisterTest, SerializeData3) { |
@@ -177,7 +179,7 @@ TEST_F(TransportSecurityPersisterTest, SerializeDataOld) { |
TEST_F(TransportSecurityPersisterTest, PublicKeyHashes) { |
TransportSecurityState::DomainState domain_state; |
static const char kTestDomain[] = "example.com"; |
- EXPECT_FALSE(state_.GetDomainState(kTestDomain, false, &domain_state)); |
+ EXPECT_FALSE(state_.GetDomainState(kTestDomain, false, true, &domain_state)); |
net::HashValueVector hashes; |
EXPECT_FALSE(domain_state.CheckPublicKeyPins(hashes)); |
@@ -203,7 +205,7 @@ TEST_F(TransportSecurityPersisterTest, PublicKeyHashes) { |
EXPECT_TRUE(persister_->SerializeData(&ser)); |
bool dirty; |
EXPECT_TRUE(persister_->LoadEntries(ser, &dirty)); |
- EXPECT_TRUE(state_.GetDomainState(kTestDomain, false, &domain_state)); |
+ EXPECT_TRUE(state_.GetDomainState(kTestDomain, false, true, &domain_state)); |
EXPECT_EQ(1u, domain_state.dynamic_spki_hashes.size()); |
EXPECT_EQ(sha1.tag, domain_state.dynamic_spki_hashes[0].tag); |
EXPECT_EQ(0, memcmp(domain_state.dynamic_spki_hashes[0].data(), sha1.data(), |