Index: third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..40d207635acd7e086c5f2c308579bdc48e4b500b |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/insecure-localhost-allowed.https.html |
@@ -0,0 +1,18 @@ |
+<!DOCTYPE html> |
+<html> |
+<body> |
+ <script src="/resources/testharness.js"></script> |
+ <script src="/resources/testharnessreport.js"></script> |
+ <script> |
+ if (window.testRunner) |
+ testRunner.overridePreference("WebKitAllowRunningInsecureContent", false); |
+ |
+ async_test(t => { |
estark
2016/05/02 04:48:46
optional nit: maybe add a sanity check that fetchi
Mike West
2016/05/04 07:50:13
Done.
|
+ fetch("http://127.0.0.1:8000/xmlhttprequest/resources/access-control-allow-lists.php?origin=*", {method: "POST"}) |
+ .then(t.step_func_done(r => r.text())) |
+ .then(t => assert_equals("", t)) |
+ .catch(t.unreached_func("Fetch should not be blocked.")); |
+ }, "Fetching 'http://127.0.0.1/' should not be blocked."); |
+ </script> |
+</body> |
+</html> |