summaryrefslogtreecommitdiff
path: root/chromium/content/browser/site_instance_impl_unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/content/browser/site_instance_impl_unittest.cc')
-rw-r--r--chromium/content/browser/site_instance_impl_unittest.cc17
1 files changed, 9 insertions, 8 deletions
diff --git a/chromium/content/browser/site_instance_impl_unittest.cc b/chromium/content/browser/site_instance_impl_unittest.cc
index 2d1b28d9992..c523ca9a06b 100644
--- a/chromium/content/browser/site_instance_impl_unittest.cc
+++ b/chromium/content/browser/site_instance_impl_unittest.cc
@@ -7,6 +7,7 @@
#include <stddef.h>
#include <memory>
+#include <string>
#include <vector>
#include "base/command_line.h"
@@ -47,7 +48,7 @@ const char kPrivilegedScheme[] = "privileged";
class SiteInstanceTestBrowserClient : public TestContentBrowserClient {
public:
- explicit SiteInstanceTestBrowserClient()
+ SiteInstanceTestBrowserClient()
: privileged_process_id_(-1),
site_instance_delete_count_(0),
browsing_instance_delete_count_(0) {
@@ -896,7 +897,7 @@ TEST_F(SiteInstanceTest, IsolatedOrigins) {
EXPECT_FALSE(policy->IsIsolatedOrigin(url::Origin(isolated_foo_url)));
EXPECT_TRUE(SiteInstance::IsSameWebSite(nullptr, foo_url, isolated_foo_url));
- policy->AddIsolatedOrigin(url::Origin(isolated_foo_url));
+ policy->AddIsolatedOrigins({url::Origin(isolated_foo_url)});
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(isolated_foo_url)));
EXPECT_FALSE(policy->IsIsolatedOrigin(url::Origin(foo_url)));
EXPECT_FALSE(policy->IsIsolatedOrigin(url::Origin(GURL("http://foo.com"))));
@@ -907,7 +908,7 @@ TEST_F(SiteInstanceTest, IsolatedOrigins) {
EXPECT_FALSE(policy->IsIsolatedOrigin(
url::Origin(GURL("http://isolated.foo.com:12345"))));
- policy->AddIsolatedOrigin(url::Origin(isolated_bar_url));
+ policy->AddIsolatedOrigins({url::Origin(isolated_bar_url)});
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(isolated_bar_url)));
// IsSameWebSite should compare origins rather than sites if either URL is an
@@ -997,7 +998,7 @@ TEST_F(SiteInstanceTest, SubdomainOnIsolatedSite) {
GURL foo_isolated_url("http://foo.isolated.com");
auto* policy = ChildProcessSecurityPolicyImpl::GetInstance();
- policy->AddIsolatedOrigin(url::Origin(isolated_url));
+ policy->AddIsolatedOrigins({url::Origin(isolated_url)});
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(isolated_url)));
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(foo_isolated_url)));
@@ -1031,7 +1032,7 @@ TEST_F(SiteInstanceTest, SubdomainOnIsolatedSite) {
// Don't try to match subdomains on IP addresses.
GURL isolated_ip("http://127.0.0.1");
- policy->AddIsolatedOrigin(url::Origin(isolated_ip));
+ policy->AddIsolatedOrigins({url::Origin(isolated_ip)});
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(isolated_ip)));
EXPECT_FALSE(
policy->IsIsolatedOrigin(url::Origin(GURL("http://42.127.0.0.1"))));
@@ -1047,7 +1048,7 @@ TEST_F(SiteInstanceTest, SubdomainOnIsolatedOrigin) {
GURL baz_isolated_foo_url("http://baz.isolated.foo.com");
auto* policy = ChildProcessSecurityPolicyImpl::GetInstance();
- policy->AddIsolatedOrigin(url::Origin(isolated_foo_url));
+ policy->AddIsolatedOrigins({url::Origin(isolated_foo_url)});
EXPECT_FALSE(policy->IsIsolatedOrigin(url::Origin(foo_url)));
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(isolated_foo_url)));
@@ -1099,8 +1100,8 @@ TEST_F(SiteInstanceTest, MultipleIsolatedOriginsWithCommonSite) {
GURL qux_baz_bar_foo_url("http://qux.baz.bar.foo.com");
auto* policy = ChildProcessSecurityPolicyImpl::GetInstance();
- policy->AddIsolatedOrigin(url::Origin(foo_url));
- policy->AddIsolatedOrigin(url::Origin(baz_bar_foo_url));
+ policy->AddIsolatedOrigins({url::Origin(foo_url)});
+ policy->AddIsolatedOrigins({url::Origin(baz_bar_foo_url)});
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(foo_url)));
EXPECT_TRUE(policy->IsIsolatedOrigin(url::Origin(bar_foo_url)));