| Index: Source/core/loader/FrameFetchContextTest.cpp
|
| diff --git a/Source/core/loader/FrameFetchContextTest.cpp b/Source/core/loader/FrameFetchContextTest.cpp
|
| index 7a1e8d4f37e35066df9bc02a610b4c06385376f1..b301c48e7038e9e698e29d811574b39d2e2ef371 100644
|
| --- a/Source/core/loader/FrameFetchContextTest.cpp
|
| +++ b/Source/core/loader/FrameFetchContextTest.cpp
|
| @@ -135,8 +135,7 @@ TEST_F(FrameFetchContextUpgradeTest, UpgradeInsecureResourceRequests)
|
| document->setInsecureRequestsPolicy(SecurityContext::InsecureRequestsUpgrade);
|
|
|
| for (auto test : tests) {
|
| - // secureOrigin's host is 'secureorigin.test', not 'example.test'
|
| - document->setSecurityOrigin(secureOrigin);
|
| + document->insecureNavigationsToUpgrade()->clear();
|
|
|
| // We always upgrade for FrameTypeNone and FrameTypeNested.
|
| expectUpgrade(test.original, WebURLRequest::RequestContextScript, WebURLRequest::FrameTypeNone, test.upgraded);
|
| @@ -150,8 +149,8 @@ TEST_F(FrameFetchContextUpgradeTest, UpgradeInsecureResourceRequests)
|
| expectUpgrade(test.original, WebURLRequest::RequestContextForm, WebURLRequest::FrameTypeTopLevel, test.upgraded);
|
| expectUpgrade(test.original, WebURLRequest::RequestContextForm, WebURLRequest::FrameTypeAuxiliary, test.upgraded);
|
|
|
| - // Or unless the host of the document matches the host of the resource:
|
| - document->setSecurityOrigin(exampleOrigin);
|
| + // Or unless the host of the resource is in the document's InsecureNavigationsSet:
|
| + document->addInsecureNavigationUpgrade(exampleOrigin->host().impl()->hash());
|
| expectUpgrade(test.original, WebURLRequest::RequestContextScript, WebURLRequest::FrameTypeTopLevel, test.upgraded);
|
| expectUpgrade(test.original, WebURLRequest::RequestContextScript, WebURLRequest::FrameTypeAuxiliary, test.upgraded);
|
| }
|
|
|