Chromium Code Reviews| Index: third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html |
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..40d207635acd7e086c5f2c308579bdc48e4b500b |
| --- /dev/null |
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html |
| @@ -0,0 +1,18 @@ |
| +<!DOCTYPE html> |
| +<html> |
| +<body> |
| + <script src="/resources/testharness.js"></script> |
| + <script src="/resources/testharnessreport.js"></script> |
| + <script> |
| + if (window.testRunner) |
| + testRunner.overridePreference("WebKitAllowRunningInsecureContent", false); |
| + |
| + async_test(t => { |
|
estark
2016/05/02 04:48:46
optional nit: maybe add a sanity check that fetchi
Mike West
2016/05/04 07:50:13
Done.
|
| + fetch("http://127.0.0.1:8000/xmlhttprequest/resources/access-control-allow-lists.php?origin=*", {method: "POST"}) |
| + .then(t.step_func_done(r => r.text())) |
| + .then(t => assert_equals("", t)) |
| + .catch(t.unreached_func("Fetch should not be blocked.")); |
| + }, "Fetching 'http://127.0.0.1/' should not be blocked."); |
| + </script> |
| +</body> |
| +</html> |