summaryrefslogtreecommitdiff
path: root/chromium/content/browser/site_instance_impl_unittest.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/content/browser/site_instance_impl_unittest.cc')
-rw-r--r--chromium/content/browser/site_instance_impl_unittest.cc310
1 files changed, 230 insertions, 80 deletions
diff --git a/chromium/content/browser/site_instance_impl_unittest.cc b/chromium/content/browser/site_instance_impl_unittest.cc
index c3f83cd267c..bc818c8206d 100644
--- a/chromium/content/browser/site_instance_impl_unittest.cc
+++ b/chromium/content/browser/site_instance_impl_unittest.cc
@@ -28,6 +28,7 @@
#include "content/browser/webui/content_web_ui_controller_factory.h"
#include "content/browser/webui/web_ui_controller_factory_registry.h"
#include "content/public/browser/browser_or_resource_context.h"
+#include "content/public/browser/site_isolation_policy.h"
#include "content/public/common/bindings_policy.h"
#include "content/public/common/content_client.h"
#include "content/public/common/content_constants.h"
@@ -170,6 +171,11 @@ class SiteInstanceTest : public testing::Test {
BrowserContext* context() { return &context_; }
+ SiteInfo GetSiteInfoForURL(const std::string& url) {
+ return SiteInstanceImpl::ComputeSiteInfo(IsolationContext(&context_),
+ GURL(url));
+ }
+
private:
BrowserTaskEnvironment task_environment_;
TestBrowserContext context_;
@@ -181,6 +187,161 @@ class SiteInstanceTest : public testing::Test {
url::ScopedSchemeRegistryForTests scoped_registry_;
};
+// Tests that SiteInfo works correct as a key for std::map and std::set.
+// Test SiteInfos with identical site URLs but various lock URLs, including
+// variations of each that are origin keyed ("ok").
+TEST_F(SiteInstanceTest, SiteInfoAsContainerKey) {
+ SiteInfo site_info_1(GURL("https://www.foo.com"), GURL("https://foo.com"),
+ false /* is_origin_keyed */);
+ SiteInfo site_info_1ok(GURL("https://www.foo.com"), GURL("https://foo.com"),
+ true /* is_origin_keyed */);
+ SiteInfo site_info_2(GURL("https://www.foo.com"), GURL("https://www.foo.com"),
+ false /* is_origin_keyed */);
+ SiteInfo site_info_2ok(GURL("https://www.foo.com"),
+ GURL("https://www.foo.com"),
+ true /* is_origin_keyed */);
+ SiteInfo site_info_3(GURL("https://www.foo.com"), GURL("https://sub.foo.com"),
+ false /* is_origin_keyed */);
+ SiteInfo site_info_3ok(GURL("https://www.foo.com"),
+ GURL("https://sub.foo.com"),
+ true /* is_origin_keyed */);
+ SiteInfo site_info_4(GURL("https://www.foo.com"), GURL(),
+ false /* is_origin_keyed */);
+ SiteInfo site_info_4ok(GURL("https://www.foo.com"), GURL(),
+ true /* is_origin_keyed */);
+
+ // Test SiteInfoOperators.
+ // Use EXPECT_TRUE and == below to avoid need to define SiteInfo::operator<<.
+ EXPECT_TRUE(site_info_1 == site_info_1);
+ EXPECT_FALSE(site_info_1 == site_info_2);
+ EXPECT_FALSE(site_info_1 == site_info_3);
+ EXPECT_FALSE(site_info_1 == site_info_4);
+ EXPECT_TRUE(site_info_2 == site_info_2);
+ EXPECT_FALSE(site_info_2 == site_info_3);
+ EXPECT_FALSE(site_info_2 == site_info_4);
+ EXPECT_TRUE(site_info_3 == site_info_3);
+ EXPECT_FALSE(site_info_3 == site_info_4);
+ EXPECT_TRUE(site_info_4 == site_info_4);
+
+ EXPECT_TRUE(site_info_1 < site_info_3); // 'f' before 's'/
+ EXPECT_TRUE(site_info_3 < site_info_2); // 's' before 'w'/
+ EXPECT_TRUE(site_info_4 < site_info_1); // Empty string first.
+
+ {
+ std::map<SiteInfo, int> test_map;
+ // Map tests: different lock URLs.
+ test_map[site_info_1] = 1;
+ test_map[site_info_2] = 2;
+ test_map[site_info_4] = 4;
+
+ // Make sure std::map treated the different SiteInfo's as distinct.
+ EXPECT_EQ(3u, test_map.size());
+
+ // Test that std::map::find() looks up the correct key.
+ auto it1 = test_map.find(site_info_1);
+ EXPECT_NE(it1, test_map.end());
+ EXPECT_EQ(1, it1->second);
+
+ auto it2 = test_map.find(site_info_2);
+ EXPECT_NE(it2, test_map.end());
+ EXPECT_EQ(2, it2->second);
+
+ EXPECT_EQ(test_map.end(), test_map.find(site_info_3));
+
+ auto it4 = test_map.find(site_info_4);
+ EXPECT_NE(it4, test_map.end());
+ EXPECT_EQ(4, it4->second);
+ }
+
+ {
+ std::map<SiteInfo, int> test_map;
+ // Map tests: different lock URLs and origin keys.
+
+ test_map[site_info_1] = 1;
+ test_map[site_info_2] = 2;
+ test_map[site_info_4] = 4;
+ test_map[site_info_1ok] = 11;
+ test_map[site_info_2ok] = 12;
+ test_map[site_info_4ok] = 14;
+
+ // Make sure std::map treated the different SiteInfo's as distinct.
+ EXPECT_EQ(6u, test_map.size());
+
+ // Test that std::map::find() looks up the correct key with is_origin_keyed
+ // == true.
+ auto it1 = test_map.find(site_info_1ok);
+ EXPECT_NE(it1, test_map.end());
+ EXPECT_EQ(11, it1->second);
+
+ auto it2 = test_map.find(site_info_2ok);
+ EXPECT_NE(it2, test_map.end());
+ EXPECT_EQ(12, it2->second);
+
+ EXPECT_EQ(test_map.end(), test_map.find(site_info_3));
+ EXPECT_EQ(test_map.end(), test_map.find(site_info_3ok));
+
+ auto it4 = test_map.find(site_info_4ok);
+ EXPECT_NE(it4, test_map.end());
+ EXPECT_EQ(14, it4->second);
+ }
+
+ {
+ std::set<SiteInfo> test_set;
+
+ // Set tests.
+ test_set.insert(site_info_1);
+ test_set.insert(site_info_2);
+ test_set.insert(site_info_4);
+
+ EXPECT_EQ(3u, test_set.size());
+
+ auto itS1 = test_set.find(site_info_1);
+ auto itS2 = test_set.find(site_info_2);
+ auto itS3 = test_set.find(site_info_3);
+ auto itS4 = test_set.find(site_info_4);
+
+ EXPECT_NE(test_set.end(), itS1);
+ EXPECT_NE(test_set.end(), itS2);
+ EXPECT_EQ(test_set.end(), itS3);
+ EXPECT_NE(test_set.end(), itS4);
+
+ // Use EXPECT_TRUE and == below to avoid need to define
+ // SiteInfo::operator<<.
+ EXPECT_TRUE(site_info_1 == *itS1);
+ EXPECT_TRUE(site_info_2 == *itS2);
+ EXPECT_TRUE(site_info_4 == *itS4);
+ }
+ {
+ std::set<SiteInfo> test_set;
+
+ // Set tests, testing is_origin_keyed.
+ test_set.insert(site_info_1);
+ test_set.insert(site_info_2);
+ test_set.insert(site_info_4);
+ test_set.insert(site_info_1ok);
+ test_set.insert(site_info_2ok);
+ test_set.insert(site_info_4ok);
+
+ EXPECT_EQ(6u, test_set.size());
+
+ auto itS1 = test_set.find(site_info_1ok);
+ auto itS2 = test_set.find(site_info_2ok);
+ auto itS3 = test_set.find(site_info_3ok);
+ auto itS4 = test_set.find(site_info_4ok);
+
+ EXPECT_NE(test_set.end(), itS1);
+ EXPECT_NE(test_set.end(), itS2);
+ EXPECT_EQ(test_set.end(), itS3);
+ EXPECT_NE(test_set.end(), itS4);
+
+ // Use EXPECT_TRUE and == below to avoid need to define
+ // SiteInfo::operator<<.
+ EXPECT_TRUE(site_info_1ok == *itS1);
+ EXPECT_TRUE(site_info_2ok == *itS2);
+ EXPECT_TRUE(site_info_4ok == *itS4);
+ }
+}
+
// Test to ensure no memory leaks for SiteInstance objects.
TEST_F(SiteInstanceTest, SiteInstanceDestructor) {
TestBrowserContext context;
@@ -459,9 +620,9 @@ TEST_F(SiteInstanceTest, ProcessLockDoesNotUseEffectiveURL) {
IsolationContext isolation_context(browser_context.get());
// Sanity check that GetSiteForURL's |use_effective_urls| option works
- // properly. When it's true, the site URL should include both the effective
- // URL's site (app.com) and the original URL's site (foo.com).
- GURL expected_app_site_url(app_url.spec() + "#" + nonapp_site_url.spec());
+ // properly. When it's true, the site URL should correspond to the
+ // effective URL's site (app.com), rather than the original URL's site
+ // (foo.com).
{
GURL site_url = SiteInstanceImpl::GetSiteForURLInternal(
isolation_context, test_url, false /* use_effective_urls */,
@@ -471,15 +632,18 @@ TEST_F(SiteInstanceTest, ProcessLockDoesNotUseEffectiveURL) {
site_url = SiteInstanceImpl::GetSiteForURLInternal(
isolation_context, test_url, true /* use_effective_urls */,
false /* allow_default_site_url */);
- EXPECT_EQ(expected_app_site_url, site_url);
+ EXPECT_EQ(app_url, site_url);
}
+ SiteInfo expected_site_info(app_url /* site_url */,
+ nonapp_site_url /* process_lock_url */,
+ false /* is_origin_keyed */);
+
// New SiteInstance in a new BrowsingInstance with a predetermined URL.
{
scoped_refptr<SiteInstanceImpl> site_instance =
SiteInstanceImpl::CreateForURL(browser_context.get(), test_url);
- EXPECT_EQ(expected_app_site_url, site_instance->GetSiteURL());
- EXPECT_EQ(nonapp_site_url, site_instance->lock_url());
+ EXPECT_EQ(expected_site_info, site_instance->GetSiteInfo());
}
// New related SiteInstance from an existing SiteInstance with a
@@ -492,8 +656,7 @@ TEST_F(SiteInstanceTest, ProcessLockDoesNotUseEffectiveURL) {
bar_site_instance->GetRelatedSiteInstance(test_url);
auto* site_instance_impl =
static_cast<SiteInstanceImpl*>(site_instance.get());
- EXPECT_EQ(expected_app_site_url, site_instance->GetSiteURL());
- EXPECT_EQ(nonapp_site_url, site_instance_impl->lock_url());
+ EXPECT_EQ(expected_site_info, site_instance_impl->GetSiteInfo());
}
// New SiteInstance with a lazily assigned site URL.
@@ -502,8 +665,7 @@ TEST_F(SiteInstanceTest, ProcessLockDoesNotUseEffectiveURL) {
SiteInstanceImpl::Create(browser_context.get());
EXPECT_FALSE(site_instance->HasSite());
site_instance->SetSite(test_url);
- EXPECT_EQ(expected_app_site_url, site_instance->GetSiteURL());
- EXPECT_EQ(nonapp_site_url, site_instance->lock_url());
+ EXPECT_EQ(expected_site_info, site_instance->GetSiteInfo());
}
SetBrowserClientForTesting(regular_client);
@@ -629,17 +791,17 @@ TEST_F(SiteInstanceTest, OneSiteInstancePerSite) {
// Should be able to see that we do have SiteInstances.
EXPECT_TRUE(browsing_instance->HasSiteInstance(
- GURL("http://mail.google.com")));
+ GetSiteInfoForURL("http://mail.google.com")));
EXPECT_TRUE(browsing_instance2->HasSiteInstance(
- GURL("http://mail.google.com")));
+ GetSiteInfoForURL("http://mail.google.com")));
EXPECT_TRUE(browsing_instance->HasSiteInstance(
- GURL("http://mail.yahoo.com")));
+ GetSiteInfoForURL("http://mail.yahoo.com")));
// Should be able to see that we don't have SiteInstances.
EXPECT_FALSE(browsing_instance->HasSiteInstance(
- GURL("https://www.google.com")));
+ GetSiteInfoForURL("https://www.google.com")));
EXPECT_FALSE(browsing_instance2->HasSiteInstance(
- GURL("http://www.yahoo.com")));
+ GetSiteInfoForURL("http://www.yahoo.com")));
// browsing_instances will be deleted when their SiteInstances are deleted.
// The processes will be unregistered when the RPH scoped_ptrs go away.
@@ -707,19 +869,19 @@ TEST_F(SiteInstanceTest, OneSiteInstancePerSiteInBrowserContext) {
// Should be able to see that we do have SiteInstances.
EXPECT_TRUE(browsing_instance->HasSiteInstance(
- GURL("http://mail.google.com"))); // visited before
+ GetSiteInfoForURL("http://mail.google.com"))); // visited before
EXPECT_TRUE(browsing_instance2->HasSiteInstance(
- GURL("http://mail.google.com"))); // visited before
+ GetSiteInfoForURL("http://mail.google.com"))); // visited before
EXPECT_TRUE(browsing_instance->HasSiteInstance(
- GURL("http://mail.yahoo.com"))); // visited before
+ GetSiteInfoForURL("http://mail.yahoo.com"))); // visited before
// Should be able to see that we don't have SiteInstances.
- EXPECT_FALSE(browsing_instance2->HasSiteInstance(
- GURL("http://www.yahoo.com"))); // different BI, same browser context
+ EXPECT_FALSE(browsing_instance2->HasSiteInstance(GetSiteInfoForURL(
+ "http://www.yahoo.com"))); // different BI, same browser context
EXPECT_FALSE(browsing_instance->HasSiteInstance(
- GURL("https://www.google.com"))); // not visited before
- EXPECT_FALSE(browsing_instance3->HasSiteInstance(
- GURL("http://www.yahoo.com"))); // different BI, different context
+ GetSiteInfoForURL("https://www.google.com"))); // not visited before
+ EXPECT_FALSE(browsing_instance3->HasSiteInstance(GetSiteInfoForURL(
+ "http://www.yahoo.com"))); // different BI, different context
// browsing_instances will be deleted when their SiteInstances are deleted.
// The processes will be unregistered when the RPH scoped_ptrs go away.
@@ -875,7 +1037,7 @@ TEST_F(SiteInstanceTest, NoProcessPerSiteForEmptySite) {
EXPECT_FALSE(RenderProcessHostImpl::GetSoleProcessHostForURL(
instance->GetIsolationContext(), GURL()));
EXPECT_FALSE(RenderProcessHostImpl::GetSoleProcessHostForSite(
- instance->GetIsolationContext(), SiteInfo(), GURL(), false));
+ instance->GetIsolationContext(), SiteInfo(), false));
DrainMessageLoop();
}
@@ -961,35 +1123,6 @@ TEST_F(SiteInstanceTest, StrictOriginIsolation) {
file_url);
}
-// Ensure that the site URL for a URL that resolves to a non-HTTP/HTTPS
-// effective site URL won't break with strict origin isolation. The effective
-// site URL should still contain the non-translated site URL in its hash. See
-// https://crbug.com/961386.
-TEST_F(SiteInstanceTest, StrictOriginIsolationWithEffectiveURLs) {
- base::test::ScopedFeatureList feature_list;
- feature_list.InitAndEnableFeature(features::kStrictOriginIsolation);
- EXPECT_TRUE(base::FeatureList::IsEnabled(features::kStrictOriginIsolation));
-
- const GURL kOriginalUrl("https://original.com");
- const GURL kTranslatedUrl(GetWebUIURL("translated"));
- EffectiveURLContentBrowserClient modified_client(
- kOriginalUrl, kTranslatedUrl,
- /* requires_dedicated_process */ true);
- ContentBrowserClient* regular_client =
- SetBrowserClientForTesting(&modified_client);
-
- TestBrowserContext browser_context;
- IsolationContext isolation_context(&browser_context);
-
- // Ensure that original.com's effective site URL still contains the
- // non-translated site URL in its hash.
- GURL expected_site_url(kTranslatedUrl.spec() + "#" + kOriginalUrl.spec());
- EXPECT_EQ(SiteInstanceImpl::GetSiteForURL(isolation_context, kOriginalUrl),
- expected_site_url);
-
- SetBrowserClientForTesting(regular_client);
-}
-
TEST_F(SiteInstanceTest, IsolatedOrigins) {
GURL foo_url("http://www.foo.com");
GURL isolated_foo_url("http://isolated.foo.com");
@@ -1295,15 +1428,18 @@ TEST_F(SiteInstanceTest, OriginalURL) {
SetBrowserClientForTesting(&modified_client);
std::unique_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
- // The site URL of of effective URL should include both the effective URL's
- // site and the original URL's site.
- GURL expected_site_url(app_url.spec() + "#" + original_url.spec());
+ SiteInfo expected_site_info(app_url /* site_url */,
+ original_url /* process_lock_url */,
+ false /* is_origin_keyed */);
- // New SiteInstance in a new BrowsingInstance with a predetermined URL.
+ // New SiteInstance in a new BrowsingInstance with a predetermined URL. In
+ // this and subsequent cases, the site URL should consist of the effective
+ // URL's site, and the process lock URL and original URLs should be based on
+ // |original_url|.
{
scoped_refptr<SiteInstanceImpl> site_instance =
SiteInstanceImpl::CreateForURL(browser_context.get(), original_url);
- EXPECT_EQ(expected_site_url, site_instance->GetSiteURL());
+ EXPECT_EQ(expected_site_info, site_instance->GetSiteInfo());
EXPECT_EQ(original_url, site_instance->original_url());
}
@@ -1317,7 +1453,7 @@ TEST_F(SiteInstanceTest, OriginalURL) {
bar_site_instance->GetRelatedSiteInstance(original_url);
auto* site_instance_impl =
static_cast<SiteInstanceImpl*>(site_instance.get());
- EXPECT_EQ(expected_site_url, site_instance->GetSiteURL());
+ EXPECT_EQ(expected_site_info, site_instance_impl->GetSiteInfo());
EXPECT_EQ(original_url, site_instance_impl->original_url());
}
@@ -1328,27 +1464,41 @@ TEST_F(SiteInstanceTest, OriginalURL) {
EXPECT_FALSE(site_instance->HasSite());
EXPECT_TRUE(site_instance->original_url().is_empty());
site_instance->SetSite(original_url);
- EXPECT_EQ(expected_site_url, site_instance->GetSiteURL());
+ EXPECT_EQ(expected_site_info, site_instance->GetSiteInfo());
EXPECT_EQ(original_url, site_instance->original_url());
}
SetBrowserClientForTesting(regular_client);
}
-TEST_F(SiteInstanceTest, IsOriginLockASite) {
- EXPECT_FALSE(SiteInstanceImpl::IsOriginLockASite(GURL("http://")));
- EXPECT_FALSE(SiteInstanceImpl::IsOriginLockASite(GURL("")));
- EXPECT_FALSE(SiteInstanceImpl::IsOriginLockASite(GURL("google.com")));
- EXPECT_FALSE(SiteInstanceImpl::IsOriginLockASite(GURL("http:")));
- EXPECT_FALSE(SiteInstanceImpl::IsOriginLockASite(GURL("chrome:")));
-
- EXPECT_TRUE(SiteInstanceImpl::IsOriginLockASite(GURL("http://foo.com")));
- EXPECT_TRUE(SiteInstanceImpl::IsOriginLockASite(GURL("http://bar.foo.com")));
- EXPECT_TRUE(SiteInstanceImpl::IsOriginLockASite(
- GURL("http://user:pass@google.com:99/foo;bar?q=a#ref")));
+namespace {
+
+ProcessLock ProcessLockFromString(const std::string& url) {
+ return ProcessLock(
+ SiteInfo(GURL(url), GURL(url), false /* is_origin_keyed */));
+}
+
+} // namespace
+
+TEST_F(SiteInstanceTest, IsProcessLockASite) {
+ EXPECT_FALSE(ProcessLockFromString("http://").IsASiteOrOrigin());
+ EXPECT_FALSE(ProcessLockFromString("").IsASiteOrOrigin());
+ EXPECT_FALSE(ProcessLockFromString("google.com").IsASiteOrOrigin());
+ EXPECT_FALSE(ProcessLockFromString("http:").IsASiteOrOrigin());
+ EXPECT_FALSE(ProcessLockFromString("chrome:").IsASiteOrOrigin());
+
+ EXPECT_TRUE(ProcessLockFromString("http://foo.com").IsASiteOrOrigin());
+ EXPECT_TRUE(ProcessLockFromString("http://bar.foo.com").IsASiteOrOrigin());
+ EXPECT_TRUE(
+ ProcessLockFromString("http://user:pass@google.com:99/foo;bar?q=a#ref")
+ .IsASiteOrOrigin());
}
TEST_F(SiteInstanceTest, StartIsolatingSite) {
+ // Skip this test case if dynamic isolated origins are not enabled.
+ if (!SiteIsolationPolicy::AreDynamicIsolatedOriginsEnabled())
+ return;
+
IsolationContext isolation_context(context());
auto* policy = ChildProcessSecurityPolicyImpl::GetInstance();
@@ -1419,17 +1569,17 @@ TEST_F(SiteInstanceTest, CreateForURL) {
EXPECT_FALSE(instance1->IsDefaultSiteInstance());
EXPECT_EQ(kNonIsolatedUrl, instance1->GetSiteURL());
}
- EXPECT_TRUE(instance1->DoesSiteForURLMatch(kNonIsolatedUrl));
+ EXPECT_TRUE(instance1->DoesSiteInfoForURLMatch(kNonIsolatedUrl));
EXPECT_TRUE(instance1->IsSameSiteWithURL(kNonIsolatedUrl));
EXPECT_FALSE(instance2->IsDefaultSiteInstance());
EXPECT_EQ(kIsolatedUrl, instance2->GetSiteURL());
- EXPECT_TRUE(instance2->DoesSiteForURLMatch(kIsolatedUrl));
+ EXPECT_TRUE(instance2->DoesSiteInfoForURLMatch(kIsolatedUrl));
EXPECT_TRUE(instance2->IsSameSiteWithURL(kIsolatedUrl));
EXPECT_FALSE(instance3->IsDefaultSiteInstance());
EXPECT_EQ(GURL("file:"), instance3->GetSiteURL());
- EXPECT_TRUE(instance3->DoesSiteForURLMatch(kFileUrl));
+ EXPECT_TRUE(instance3->DoesSiteInfoForURLMatch(kFileUrl));
// Not same site because file URL's don't have a host.
EXPECT_FALSE(instance3->IsSameSiteWithURL(kFileUrl));
@@ -1438,7 +1588,7 @@ TEST_F(SiteInstanceTest, CreateForURL) {
// site URL will be set at a later time.
EXPECT_FALSE(instance4->IsDefaultSiteInstance());
EXPECT_FALSE(instance4->HasSite());
- EXPECT_FALSE(instance4->DoesSiteForURLMatch(GURL(url::kAboutBlankURL)));
+ EXPECT_FALSE(instance4->DoesSiteInfoForURLMatch(GURL(url::kAboutBlankURL)));
EXPECT_FALSE(instance4->IsSameSiteWithURL(GURL(url::kAboutBlankURL)));
// Test the standard effective URL case.
@@ -1447,10 +1597,10 @@ TEST_F(SiteInstanceTest, CreateForURL) {
EXPECT_TRUE(instance5->IsDefaultSiteInstance());
} else {
EXPECT_FALSE(instance5->IsDefaultSiteInstance());
- EXPECT_EQ("custom-standard://custom/#http://foo.com/",
- instance5->GetSiteURL());
+ EXPECT_EQ("custom-standard://custom/", instance5->GetSiteURL());
+ EXPECT_EQ("http://foo.com/", instance5->GetSiteInfo().process_lock_url());
}
- EXPECT_TRUE(instance5->DoesSiteForURLMatch(kCustomUrl));
+ EXPECT_TRUE(instance5->DoesSiteInfoForURLMatch(kCustomUrl));
EXPECT_TRUE(instance5->IsSameSiteWithURL(kCustomUrl));
// Test the "do not assign site" case with an effective URL.
@@ -1460,7 +1610,7 @@ TEST_F(SiteInstanceTest, CreateForURL) {
// Verify that the default SiteInstance is no longer a site match
// with |kCustomUrl| because this URL now requires a SiteInstance that
// does not have its site set.
- EXPECT_FALSE(instance5->DoesSiteForURLMatch(kCustomUrl));
+ EXPECT_FALSE(instance5->DoesSiteInfoForURLMatch(kCustomUrl));
EXPECT_FALSE(instance5->IsSameSiteWithURL(kCustomUrl));
}
@@ -1469,7 +1619,7 @@ TEST_F(SiteInstanceTest, CreateForURL) {
auto instance6 = SiteInstanceImpl::CreateForURL(context(), kCustomUrl);
EXPECT_FALSE(instance6->IsDefaultSiteInstance());
EXPECT_FALSE(instance6->HasSite());
- EXPECT_FALSE(instance6->DoesSiteForURLMatch(kCustomUrl));
+ EXPECT_FALSE(instance6->DoesSiteInfoForURLMatch(kCustomUrl));
EXPECT_FALSE(instance6->IsSameSiteWithURL(kCustomUrl));
SetBrowserClientForTesting(regular_client);