Index: Source/core/loader/FrameFetchContextTest.cpp |
diff --git a/Source/core/loader/FrameFetchContextTest.cpp b/Source/core/loader/FrameFetchContextTest.cpp |
index 7b53ed7deb60bd0833a3efa8f9f7fc6d35df5cfa..91ac63d01d1e4dc3e06809ea4dfabebf4ebff804 100644 |
--- a/Source/core/loader/FrameFetchContextTest.cpp |
+++ b/Source/core/loader/FrameFetchContextTest.cpp |
@@ -140,8 +140,7 @@ TEST_F(FrameFetchContextUpgradeTest, UpgradeInsecureResourceRequests) |
document->setInsecureRequestsPolicy(SecurityContext::InsecureRequestsUpgrade); |
for (auto test : tests) { |
- // secureOrigin's host is 'secureorigin.test', not 'example.test' |
- document->setSecurityOrigin(secureOrigin); |
+ document->insecureNavigationsToUpgrade()->clear(); |
// We always upgrade for FrameTypeNone and FrameTypeNested. |
expectUpgrade(test.original, WebURLRequest::RequestContextScript, WebURLRequest::FrameTypeNone, test.upgraded); |
@@ -155,8 +154,8 @@ TEST_F(FrameFetchContextUpgradeTest, UpgradeInsecureResourceRequests) |
expectUpgrade(test.original, WebURLRequest::RequestContextForm, WebURLRequest::FrameTypeTopLevel, test.upgraded); |
expectUpgrade(test.original, WebURLRequest::RequestContextForm, WebURLRequest::FrameTypeAuxiliary, test.upgraded); |
- // Or unless the host of the document matches the host of the resource: |
- document->setSecurityOrigin(exampleOrigin); |
+ // Or unless the host of the resource is in the document's InsecureNavigationsSet: |
+ document->addInsecureNavigationUpgrade(exampleOrigin->host().impl()->hash()); |
expectUpgrade(test.original, WebURLRequest::RequestContextScript, WebURLRequest::FrameTypeTopLevel, test.upgraded); |
expectUpgrade(test.original, WebURLRequest::RequestContextScript, WebURLRequest::FrameTypeAuxiliary, test.upgraded); |
} |