Index: content/common/content_security_policy/content_security_policy_unittest.cc |
diff --git a/content/common/content_security_policy/content_security_policy_unittest.cc b/content/common/content_security_policy/content_security_policy_unittest.cc |
index ee9ae79e261802d4197643a2fcfb9b24344ed1b0..e14a04166388d48838e636a123a6797a559ff131 100644 |
--- a/content/common/content_security_policy/content_security_policy_unittest.cc |
+++ b/content/common/content_security_policy/content_security_policy_unittest.cc |
@@ -238,4 +238,20 @@ TEST(ContentSecurityPolicy, BlobAllowedWhenBypassingCSP) { |
false, &context, SourceLocation())); |
} |
+TEST(ContentSecurityPolicy, ShouldUpgradeInsecureRequest) { |
+ std::vector<std::string> report_end_points; // empty |
+ CSPSource source("https", "example.com", false, url::PORT_UNSPECIFIED, false, |
+ ""); |
+ CSPSourceList source_list(false, false, {source}); |
+ ContentSecurityPolicy policy( |
+ EmptyCspHeader(), {CSPDirective(CSPDirective::DefaultSrc, source_list)}, |
+ report_end_points); |
+ |
+ EXPECT_FALSE(ContentSecurityPolicy::ShouldUpgradeInsecureRequest(policy)); |
+ |
+ policy.directives.push_back( |
+ CSPDirective(CSPDirective::UpgradeInsecureRequests, CSPSourceList())); |
+ EXPECT_TRUE(ContentSecurityPolicy::ShouldUpgradeInsecureRequest(policy)); |
+} |
+ |
} // namespace content |