Index: third_party/WebKit/LayoutTests/http/tests/security/upgrade-insecure-requests/basic-upgrade-redirect.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/upgrade-insecure-requests/basic-upgrade-redirect.html b/third_party/WebKit/LayoutTests/http/tests/security/upgrade-insecure-requests/basic-upgrade-redirect.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..280b328a125c82b5cbc6553f2ed89e6b9fd88dcd |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/upgrade-insecure-requests/basic-upgrade-redirect.html |
@@ -0,0 +1,35 @@ |
+<!DOCTYPE html> |
+<title>Upgrade Insecure Requests: Basics with a redirection.</title> |
+<script src="/resources/testharness.js"></script> |
+<script src="/resources/testharnessreport.js"></script> |
+ |
+<meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests"> |
+ |
+<script> |
+// This is a bit of a hack. UPGRADE doesn't upgrade the port number, so we |
+// specify this non-existent URL ('http' over port 8443). If UPGRADE doesn't |
+// work, it won't load. |
+var origin = [ |
+ {name: "same origin" , url: "http://127.0.0.1:8443"}, |
+ {name: "cross origin" , url: "http://example.test:8443"} |
+]; |
+ |
+var redirect_url = "/resources/redirect.php?url="; |
+var image_url = "/security/resources/abe.png"; |
+ |
+origin.forEach(function(redirector_origin) { |
+ origin.forEach(function(redirected_origin) { |
+ async_test(t => { |
+ var i = document.createElement("img"); |
+ i.onload = t.step_func_done(_ => { |
+ assert_equals(i.naturalHeight, 103, "Height."); |
+ assert_equals(i.naturalWidth, 76, "Width."); |
+ t.done(); |
+ }); |
+ i.onerror = t.unreached_func("The image should load."); |
+ i.src = redirector_origin.url + redirect_url + redirected_origin.url + image_url; |
+ }, "Verify that " + redirector_origin.name + " images with " + redirected_origin.name + " redirection are both upgraded."); |
+ }); |
+}); |
+ |
+</script> |