summaryrefslogtreecommitdiffstats
path: root/chrome/browser/ssl/ssl_browser_tests.cc
diff options
context:
space:
mode:
authorphajdan.jr@chromium.org <phajdan.jr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-29 21:44:12 +0000
committerphajdan.jr@chromium.org <phajdan.jr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-29 21:44:12 +0000
commit3985ba8a1d1e396d98c4dbec84077d6a67109db9 (patch)
treeaa092101b582f5a9973fc68cce625834a9436c86 /chrome/browser/ssl/ssl_browser_tests.cc
parent4ada238a76785ee78396cfb8e5992044c302de1e (diff)
downloadchromium_src-3985ba8a1d1e396d98c4dbec84077d6a67109db9.zip
chromium_src-3985ba8a1d1e396d98c4dbec84077d6a67109db9.tar.gz
chromium_src-3985ba8a1d1e396d98c4dbec84077d6a67109db9.tar.bz2
GTTF: Move more test server code from net/url_request/url_request_unittest.h
to net/test/test_server.h No code changes, just a move. TEST=none BUG=49680 Review URL: http://codereview.chromium.org/3034038 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@54201 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/ssl/ssl_browser_tests.cc')
-rw-r--r--chrome/browser/ssl/ssl_browser_tests.cc132
1 files changed, 67 insertions, 65 deletions
diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc
index a0d2279..aab0cd2 100644
--- a/chrome/browser/ssl/ssl_browser_tests.cc
+++ b/chrome/browser/ssl/ssl_browser_tests.cc
@@ -12,6 +12,8 @@
#include "chrome/common/pref_names.h"
#include "chrome/test/in_process_browser_test.h"
#include "chrome/test/ui_test_utils.h"
+#include "net/base/cert_status_flags.h"
+#include "net/test/test_server.h"
const wchar_t kDocRoot[] = L"chrome/test/data";
@@ -21,16 +23,16 @@ class SSLUITest : public InProcessBrowserTest {
EnableDOMAutomation();
}
- scoped_refptr<HTTPTestServer> PlainServer() {
- return HTTPTestServer::CreateServer(kDocRoot);
+ scoped_refptr<net::HTTPTestServer> PlainServer() {
+ return net::HTTPTestServer::CreateServer(kDocRoot);
}
- scoped_refptr<HTTPSTestServer> GoodCertServer() {
- return HTTPSTestServer::CreateGoodServer(kDocRoot);
+ scoped_refptr<net::HTTPSTestServer> GoodCertServer() {
+ return net::HTTPSTestServer::CreateGoodServer(kDocRoot);
}
- scoped_refptr<HTTPSTestServer> BadCertServer() {
- return HTTPSTestServer::CreateExpiredServer(kDocRoot);
+ scoped_refptr<net::HTTPSTestServer> BadCertServer() {
+ return net::HTTPSTestServer::CreateExpiredServer(kDocRoot);
}
void CheckAuthenticatedState(TabContents* tab,
@@ -120,7 +122,7 @@ class SSLUITest : public InProcessBrowserTest {
// Visits a regular page over http.
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) {
- scoped_refptr<HTTPTestServer> server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> server = PlainServer();
ASSERT_TRUE(server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -134,9 +136,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) {
// TODO(jcampan): test that bad HTTPS content is blocked (otherwise we'll give
// the secure cookies away!).
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -147,7 +149,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPWithBrokenHTTPSResource) {
// Visits a page over OK https:
IN_PROC_BROWSER_TEST_F(SSLUITest, TestOKHTTPS) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -158,7 +160,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestOKHTTPS) {
// Visits a page with https error and proceed:
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndProceed) {
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -186,11 +188,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndProceed) {
FLAKY_TestHTTPSExpiredCertAndDontProceed
#endif
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndDontProceed) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
// First navigate to an OK page.
@@ -234,9 +236,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestHTTPSExpiredCertAndDontProceed) {
// Visits a page with https error and then goes back using Browser::GoBack.
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoBackViaButton) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
// First navigate to an HTTP page.
@@ -263,9 +265,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSExpiredCertAndGoBackViaButton) {
// Visits a page with https error and then goes back using GoToOffset.
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoBackViaMenu) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
// First navigate to an HTTP page.
@@ -292,9 +294,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoBackViaMenu) {
// Visits a page with https error and then goes forward using GoToOffset.
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoForward) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
// First navigate to two HTTP pages.
@@ -338,9 +340,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestHTTPSExpiredCertAndGoForward) {
// does not cause any problems (it was causing a crasher, see
// http://crbug.com/19941).
IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSErrorWithNoNavEntry) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
// Load a page with a link that opens a new window (therefore with no history
@@ -382,9 +384,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTPSErrorWithNoNavEntry) {
// Visits a page that displays insecure content.
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContent) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
// Load a page that displays insecure content.
@@ -398,9 +400,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContent) {
// content warnings by randomizing location.hash.
// Based on http://crbug.com/8706
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecuredContentRandomizeHash) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(), https_server->TestServerPage(
@@ -415,9 +417,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecuredContentRandomizeHash) {
// - images and scripts are filtered out entirely
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContents) {
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(), good_https_server->TestServerPage(
@@ -454,9 +456,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContents) {
// Visits a page with insecure content loaded by JS (after the initial page
// load).
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentLoadedFromJS) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(), https_server->TestServerPage(
@@ -479,9 +481,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentLoadedFromJS) {
// one that doesn't. The test checks that we do not propagate the insecure
// content state from one to the other.
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentTwoTabs) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -511,9 +513,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysInsecureContentTwoTabs) {
// that doesn't. The test checks that we propagate the insecure content state
// from one to the other.
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -544,9 +546,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsInsecureContentTwoTabs) {
// referencing that same image over http (hoping it is coming from the webcore
// memory cache).
IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(), http_server->TestServerPage(
@@ -565,9 +567,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestDisplaysCachedInsecureContent) {
// referencing that same script over http (hoping it is coming from the webcore
// memory cache).
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsCachedInsecureContent) {
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -593,8 +595,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRunsCachedInsecureContent) {
// (see bug #1044942) and that it depends on the host-name.
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestCNInvalidStickiness) {
const std::string kLocalHost = "localhost";
- scoped_refptr<HTTPSTestServer> https_server =
- HTTPSTestServer::CreateMismatchedServer(kDocRoot);
+ scoped_refptr<net::HTTPSTestServer> https_server =
+ net::HTTPSTestServer::CreateMismatchedServer(kDocRoot);
ASSERT_TRUE(https_server.get() != NULL);
// First we hit the server with hostname, this generates an invalid policy
@@ -639,7 +641,7 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestCNInvalidStickiness) {
// Test that navigating to a #ref does not change a bad security state.
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) {
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -668,9 +670,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRefNavigation) {
// TODO(jcampan): http://crbug.com/2136 disabled because the popup is not
// opened as it is not initiated by a user gesture.
IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
ui_test_utils::NavigateToURL(browser(),
@@ -703,9 +705,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestCloseTabWithUnsafePopup) {
// Visit a page over bad https that is a redirect to a page with good https.
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectBadToGoodHTTPS) {
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
GURL url1 = bad_https_server->TestServerPage("server-redirect?");
@@ -727,9 +729,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectBadToGoodHTTPS) {
// Visit a page over good https that is a redirect to a page with bad https.
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectGoodToBadHTTPS) {
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
GURL url1 = good_https_server->TestServerPage("server-redirect?");
@@ -748,9 +750,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectGoodToBadHTTPS) {
// Visit a page over http that is a redirect to a page with good HTTPS.
IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
TabContents* tab = browser()->GetSelectedTabContents();
@@ -767,9 +769,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestRedirectHTTPToGoodHTTPS) {
// Visit a page over http that is a redirect to a page with bad HTTPS.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectHTTPToBadHTTPS) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
TabContents* tab = browser()->GetSelectedTabContents();
@@ -792,9 +794,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectHTTPToBadHTTPS) {
// we don't keep the secure state).
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestRedirectHTTPSToHTTP) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> https_server = GoodCertServer();
ASSERT_TRUE(https_server.get() != NULL);
GURL https_url = https_server->TestServerPage("server-redirect?");
@@ -827,11 +829,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, TestConnectToBadPort) {
// - navigate to HTTP (expect insecure content), then back
// Disabled, http://crbug.com/18626.
IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestGoodFrameNavigation) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
TabContents* tab = browser()->GetSelectedTabContents();
@@ -899,9 +901,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, DISABLED_TestGoodFrameNavigation) {
// - navigate to an OK HTTPS frame (expected to be still authentication broken).
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestBadFrameNavigation) {
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
TabContents* tab = browser()->GetSelectedTabContents();
@@ -938,11 +940,11 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestBadFrameNavigation) {
FLAKY_TestUnauthenticatedFrameNavigation
#endif
IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestUnauthenticatedFrameNavigation) {
- scoped_refptr<HTTPTestServer> http_server = PlainServer();
+ scoped_refptr<net::HTTPTestServer> http_server = PlainServer();
ASSERT_TRUE(http_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
TabContents* tab = browser()->GetSelectedTabContents();
@@ -986,9 +988,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, MAYBE_TestUnauthenticatedFrameNavigation) {
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContentsInWorkerFiltered) {
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
// This page will spawn a Worker which will try to load content from
@@ -1004,9 +1006,9 @@ IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContentsInWorkerFiltered) {
// Marked as flaky, see bug 40932.
IN_PROC_BROWSER_TEST_F(SSLUITest, FLAKY_TestUnsafeContentsInWorker) {
- scoped_refptr<HTTPSTestServer> good_https_server = GoodCertServer();
+ scoped_refptr<net::HTTPSTestServer> good_https_server = GoodCertServer();
ASSERT_TRUE(good_https_server.get() != NULL);
- scoped_refptr<HTTPSTestServer> bad_https_server = BadCertServer();
+ scoped_refptr<net::HTTPSTestServer> bad_https_server = BadCertServer();
ASSERT_TRUE(bad_https_server.get() != NULL);
// Navigate to an unsafe site. Proceed with interstitial page to indicate