| Index: content/common/content_security_policy/content_security_policy_unittest.cc
|
| diff --git a/content/common/content_security_policy/content_security_policy_unittest.cc b/content/common/content_security_policy/content_security_policy_unittest.cc
|
| index ee9ae79e261802d4197643a2fcfb9b24344ed1b0..e14a04166388d48838e636a123a6797a559ff131 100644
|
| --- a/content/common/content_security_policy/content_security_policy_unittest.cc
|
| +++ b/content/common/content_security_policy/content_security_policy_unittest.cc
|
| @@ -238,4 +238,20 @@ TEST(ContentSecurityPolicy, BlobAllowedWhenBypassingCSP) {
|
| false, &context, SourceLocation()));
|
| }
|
|
|
| +TEST(ContentSecurityPolicy, ShouldUpgradeInsecureRequest) {
|
| + std::vector<std::string> report_end_points; // empty
|
| + CSPSource source("https", "example.com", false, url::PORT_UNSPECIFIED, false,
|
| + "");
|
| + CSPSourceList source_list(false, false, {source});
|
| + ContentSecurityPolicy policy(
|
| + EmptyCspHeader(), {CSPDirective(CSPDirective::DefaultSrc, source_list)},
|
| + report_end_points);
|
| +
|
| + EXPECT_FALSE(ContentSecurityPolicy::ShouldUpgradeInsecureRequest(policy));
|
| +
|
| + policy.directives.push_back(
|
| + CSPDirective(CSPDirective::UpgradeInsecureRequests, CSPSourceList()));
|
| + EXPECT_TRUE(ContentSecurityPolicy::ShouldUpgradeInsecureRequest(policy));
|
| +}
|
| +
|
| } // namespace content
|
|
|