| Index: third_party/WebKit/Source/platform/weborigin/SecurityPolicyTest.cpp
|
| diff --git a/third_party/WebKit/Source/platform/weborigin/SecurityPolicyTest.cpp b/third_party/WebKit/Source/platform/weborigin/SecurityPolicyTest.cpp
|
| index fbd6a720dadb34362ac1fba52218edc2d802d778..90340d7b4d9053c39f2a22a4f34ba7652dcb6065 100644
|
| --- a/third_party/WebKit/Source/platform/weborigin/SecurityPolicyTest.cpp
|
| +++ b/third_party/WebKit/Source/platform/weborigin/SecurityPolicyTest.cpp
|
| @@ -188,4 +188,21 @@ TEST(SecurityPolicyTest, TrustworthyWhiteList)
|
| }
|
| }
|
|
|
| +TEST(SecurityPolicyTest, BypassSecureContextCheck)
|
| +{
|
| + RefPtr<SecurityOrigin> origin1 = SecurityOrigin::createFromString("http://a.test/path/to/file.html");
|
| + RefPtr<SecurityOrigin> origin2 = SecurityOrigin::createFromString("https://a.test/path/to/file.html");
|
| + RefPtr<SecurityOrigin> origin3 = SecurityOrigin::createFromString("random-scheme://a.b/c");
|
| +
|
| + EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin1));
|
| + EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin2));
|
| + EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin3));
|
| +
|
| + SecurityPolicy::addSchemeToBypassSecureContextWhitelist("random-scheme");
|
| +
|
| + EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin1));
|
| + EXPECT_FALSE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin2));
|
| + EXPECT_TRUE(SecurityPolicy::shouldOriginBypassSecureContextCheck(*origin3));
|
| +}
|
| +
|
| } // namespace blink
|
|
|