| Index: Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| diff --git a/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| index ea65cdf580e60c84f21483e98547ba9ede4f561d..b66945ad4568d9b853d59e20fe46b3f38edbbea1 100644
|
| --- a/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| +++ b/Source/core/frame/csp/ContentSecurityPolicyTest.cpp
|
| @@ -38,20 +38,8 @@ protected:
|
| RefPtrWillBePersistent<Document> document;
|
| };
|
|
|
| -TEST_F(ContentSecurityPolicyTest, ParseUpgradeInsecureRequestsDisabled)
|
| -{
|
| - RuntimeEnabledFeatures::setExperimentalContentSecurityPolicyFeaturesEnabled(false);
|
| - csp->didReceiveHeader("upgrade-insecure-requests", ContentSecurityPolicyHeaderTypeEnforce, ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_EQ(SecurityContext::InsecureRequestsDoNotUpgrade, csp->insecureRequestsPolicy());
|
| -
|
| - csp->bindToExecutionContext(document.get());
|
| - EXPECT_EQ(SecurityContext::InsecureRequestsDoNotUpgrade, document->insecureRequestsPolicy());
|
| - EXPECT_FALSE(document->insecureNavigationsToUpgrade()->contains(secureOrigin->host().impl()->hash()));
|
| -}
|
| -
|
| TEST_F(ContentSecurityPolicyTest, ParseUpgradeInsecureRequestsEnabled)
|
| {
|
| - RuntimeEnabledFeatures::setExperimentalContentSecurityPolicyFeaturesEnabled(true);
|
| csp->didReceiveHeader("upgrade-insecure-requests", ContentSecurityPolicyHeaderTypeEnforce, ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_EQ(SecurityContext::InsecureRequestsUpgrade, csp->insecureRequestsPolicy());
|
|
|
| @@ -60,20 +48,8 @@ TEST_F(ContentSecurityPolicyTest, ParseUpgradeInsecureRequestsEnabled)
|
| EXPECT_TRUE(document->insecureNavigationsToUpgrade()->contains(secureOrigin->host().impl()->hash()));
|
| }
|
|
|
| -TEST_F(ContentSecurityPolicyTest, ParseMonitorInsecureRequestsDisabled)
|
| -{
|
| - RuntimeEnabledFeatures::setExperimentalContentSecurityPolicyFeaturesEnabled(false);
|
| - csp->didReceiveHeader("upgrade-insecure-requests", ContentSecurityPolicyHeaderTypeReport, ContentSecurityPolicyHeaderSourceHTTP);
|
| - EXPECT_EQ(SecurityContext::InsecureRequestsDoNotUpgrade, csp->insecureRequestsPolicy());
|
| -
|
| - csp->bindToExecutionContext(document.get());
|
| - EXPECT_EQ(SecurityContext::InsecureRequestsDoNotUpgrade, document->insecureRequestsPolicy());
|
| - EXPECT_FALSE(document->insecureNavigationsToUpgrade()->contains(secureOrigin->host().impl()->hash()));
|
| -}
|
| -
|
| TEST_F(ContentSecurityPolicyTest, ParseMonitorInsecureRequestsEnabled)
|
| {
|
| - RuntimeEnabledFeatures::setExperimentalContentSecurityPolicyFeaturesEnabled(true);
|
| csp->didReceiveHeader("upgrade-insecure-requests", ContentSecurityPolicyHeaderTypeReport, ContentSecurityPolicyHeaderSourceHTTP);
|
| EXPECT_EQ(SecurityContext::InsecureRequestsDoNotUpgrade, csp->insecureRequestsPolicy());
|
|
|
|
|