diff options
author | estark <estark@chromium.org> | 2015-07-28 15:42:46 -0700 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2015-07-28 22:43:18 +0000 |
commit | 0c388aaf008fe3549e436fdfa3b2d2ee95b9a011 (patch) | |
tree | a19334865538c338914fc5edbe492a63be997a86 /content/common/ssl_status_serialization_unittest.cc | |
parent | 772c9c76dd4af50f697e67751867686c15321435 (diff) | |
download | chromium_src-0c388aaf008fe3549e436fdfa3b2d2ee95b9a011.zip chromium_src-0c388aaf008fe3549e436fdfa3b2d2ee95b9a011.tar.gz chromium_src-0c388aaf008fe3549e436fdfa3b2d2ee95b9a011.tar.bz2 |
Revert of Attach a SecurityStyle to each request in ResourceLoader (patchset #9 id:160001 of https://codereview.chromium.org/1244863003/)
Reason for revert:
SecurityStyleChanged browser test is flaky after this change: http://build.chromium.org/p/chromium.linux/builders/Linux%20Tests
Original issue's description:
> Attach a SecurityStyle to each request in ResourceLoader
>
> This CL adds a SecurityStyle to the serialized security information that
> is sent with each request from the browser to the renderer. The
> SecurityStyle describes the individual resource, not any bigger-picture
> concerns like mixed content. The per-request SecurityStyle will be
> displayed in DevTools to help developers diagnose SSL issues on
> subresources.
>
> BUG=502118, 445234
>
> Committed: https://crrev.com/5318895a4dd623caf5d152461684935c6e874e12
> Cr-Commit-Position: refs/heads/master@{#340762}
TBR=creis@chromium.org,davidben@chromium.org,palmer@chromium.org,msw@chromium.org
NOPRESUBMIT=true
NOTREECHECKS=true
NOTRY=true
BUG=502118, 445234
Review URL: https://codereview.chromium.org/1259253009
Cr-Commit-Position: refs/heads/master@{#340785}
Diffstat (limited to 'content/common/ssl_status_serialization_unittest.cc')
-rw-r--r-- | content/common/ssl_status_serialization_unittest.cc | 65 |
1 files changed, 23 insertions, 42 deletions
diff --git a/content/common/ssl_status_serialization_unittest.cc b/content/common/ssl_status_serialization_unittest.cc index f8b4852..f5595c2 100644 --- a/content/common/ssl_status_serialization_unittest.cc +++ b/content/common/ssl_status_serialization_unittest.cc @@ -13,28 +13,28 @@ namespace content { // deserialization and deserializes correctly. TEST(SSLStatusSerializationTest, DeserializeSerializedStatus) { // Serialize dummy data and test that it deserializes properly. - SSLStatus status; - status.security_style = SECURITY_STYLE_AUTHENTICATED; - status.cert_id = 1; - status.cert_status = net::CERT_STATUS_DATE_INVALID; - status.security_bits = 80; - status.connection_status = net::SSL_CONNECTION_VERSION_TLS1_2; + int cert_id = 1; + net::CertStatus cert_status = net::CERT_STATUS_DATE_INVALID; + int security_bits = 80; + int connection_status = net::SSL_CONNECTION_VERSION_TLS1_2; + SignedCertificateTimestampIDStatusList sct_list; SignedCertificateTimestampIDAndStatus sct(1, net::ct::SCT_STATUS_OK); - status.signed_certificate_timestamp_ids.push_back(sct); + sct_list.push_back(sct); - std::string serialized = SerializeSecurityInfo(status); + std::string serialized = SerializeSecurityInfo( + cert_id, cert_status, security_bits, connection_status, sct_list); SSLStatus deserialized; ASSERT_TRUE(DeserializeSecurityInfo(serialized, &deserialized)); - EXPECT_EQ(status.security_style, deserialized.security_style); - EXPECT_EQ(status.cert_id, deserialized.cert_id); - EXPECT_EQ(status.cert_status, deserialized.cert_status); - EXPECT_EQ(status.security_bits, deserialized.security_bits); - EXPECT_EQ(status.connection_status, deserialized.connection_status); - EXPECT_EQ(status.signed_certificate_timestamp_ids.size(), + EXPECT_EQ(cert_id, deserialized.cert_id); + EXPECT_EQ(cert_status, deserialized.cert_status); + EXPECT_EQ(security_bits, deserialized.security_bits); + EXPECT_EQ(connection_status, deserialized.connection_status); + EXPECT_EQ(sct_list.size(), deserialized.signed_certificate_timestamp_ids.size()); EXPECT_EQ(sct, deserialized.signed_certificate_timestamp_ids[0]); - // Test that |content_status| has the default (initialized) value. + // Test that the other fields have default (initialized) values. + EXPECT_EQ(SECURITY_STYLE_UNKNOWN, deserialized.security_style); EXPECT_EQ(SSLStatus::NORMAL_CONTENT, deserialized.content_status); } @@ -62,37 +62,18 @@ TEST(SSLStatusSerializationTest, DeserializeBogusStatus) { // Serialize a status with a bad |security_bits| value and test that // deserializing it fails. - SSLStatus status; - status.security_style = SECURITY_STYLE_AUTHENTICATED; - status.cert_id = 1; - status.cert_status = net::CERT_STATUS_DATE_INVALID; + int cert_id = 1; + net::CertStatus cert_status = net::CERT_STATUS_DATE_INVALID; // |security_bits| must be <-1. (-1 means the strength is unknown, and // |0 means the connection is not encrypted). - status.security_bits = -5; - status.connection_status = net::SSL_CONNECTION_VERSION_TLS1_2; + int security_bits = -5; + int connection_status = net::SSL_CONNECTION_VERSION_TLS1_2; + SignedCertificateTimestampIDStatusList sct_list; SignedCertificateTimestampIDAndStatus sct(1, net::ct::SCT_STATUS_OK); - status.signed_certificate_timestamp_ids.push_back(sct); + sct_list.push_back(sct); - std::string serialized = SerializeSecurityInfo(status); - ASSERT_FALSE(DeserializeSecurityInfo(serialized, &invalid_deserialized)); - - EXPECT_EQ(default_ssl_status.security_style, - invalid_deserialized.security_style); - EXPECT_EQ(default_ssl_status.cert_id, invalid_deserialized.cert_id); - EXPECT_EQ(default_ssl_status.cert_status, invalid_deserialized.cert_status); - EXPECT_EQ(default_ssl_status.security_bits, - invalid_deserialized.security_bits); - EXPECT_EQ(default_ssl_status.connection_status, - invalid_deserialized.connection_status); - EXPECT_EQ(default_ssl_status.content_status, - invalid_deserialized.content_status); - EXPECT_EQ(0u, invalid_deserialized.signed_certificate_timestamp_ids.size()); - - // Now serialize a status with a bad |security_style| value and test - // that deserializing fails. - status.security_bits = 128; - status.security_style = static_cast<SecurityStyle>(100); - serialized = SerializeSecurityInfo(status); + std::string serialized = SerializeSecurityInfo( + cert_id, cert_status, security_bits, connection_status, sct_list); ASSERT_FALSE(DeserializeSecurityInfo(serialized, &invalid_deserialized)); EXPECT_EQ(default_ssl_status.security_style, |