| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2014 Google Inc. All rights reserved. | 2 * Copyright (C) 2014 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 170 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 181 RefPtr<SecurityOrigin> origin2 = SecurityOrigin::createFromString(test.a
notherUrlInOrigin); | 181 RefPtr<SecurityOrigin> origin2 = SecurityOrigin::createFromString(test.a
notherUrlInOrigin); |
| 182 | 182 |
| 183 EXPECT_FALSE(origin1->isPotentiallyTrustworthy(errorMessage)); | 183 EXPECT_FALSE(origin1->isPotentiallyTrustworthy(errorMessage)); |
| 184 EXPECT_FALSE(origin2->isPotentiallyTrustworthy(errorMessage)); | 184 EXPECT_FALSE(origin2->isPotentiallyTrustworthy(errorMessage)); |
| 185 SecurityPolicy::addOriginTrustworthyWhiteList(origin1); | 185 SecurityPolicy::addOriginTrustworthyWhiteList(origin1); |
| 186 EXPECT_TRUE(origin1->isPotentiallyTrustworthy(errorMessage)); | 186 EXPECT_TRUE(origin1->isPotentiallyTrustworthy(errorMessage)); |
| 187 EXPECT_TRUE(origin2->isPotentiallyTrustworthy(errorMessage)); | 187 EXPECT_TRUE(origin2->isPotentiallyTrustworthy(errorMessage)); |
| 188 } | 188 } |
| 189 } | 189 } |
| 190 | 190 |
| 191 TEST(SecurityPolicyTest, BypassSecureContextCheck) |
| 192 { |
| 193 RefPtr<SecurityOrigin> origin1 = SecurityOrigin::createFromString("http://a.
test/path/to/file.html"); |
| 194 RefPtr<SecurityOrigin> origin2 = SecurityOrigin::createFromString("https://a
.test/path/to/file.html"); |
| 195 RefPtr<SecurityOrigin> origin3 = SecurityOrigin::createFromString("random-sc
heme://a.b/c"); |
| 196 |
| 197 EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin1))
; |
| 198 EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin2))
; |
| 199 EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin3))
; |
| 200 |
| 201 SecurityPolicy::addSchemeToBypassSecureContextWhitelist("random-scheme"); |
| 202 |
| 203 EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin1))
; |
| 204 EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin2))
; |
| 205 EXPECT_TRUE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin3)); |
| 206 } |
| 207 |
| 191 } // namespace blink | 208 } // namespace blink |
| OLD | NEW |