Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index b114ecc2dfe8509e3a951d1ede8e63417f25ebd5..099a31988bbd37238774fd46c9252c3dc638170d 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -10,7 +10,6 @@ |
#endif |
#include <algorithm> |
-#include <string> |
#include "base/basictypes.h" |
#include "base/bind.h" |
@@ -99,6 +98,7 @@ |
using base::ASCIIToUTF16; |
using base::Time; |
+using std::string; |
namespace net { |
@@ -5437,6 +5437,25 @@ TEST_F(URLRequestTestHTTP, NoCacheOnNetworkDelegateRedirect) { |
} |
} |
+// Make sure an HTTP request using the "unsafe" port 443 fails. |
+// See: https://crbug.com/436451 |
+TEST_F(URLRequestTestHTTP, UnsafePort) { |
+ TestDelegate d; |
+ { |
+ scoped_ptr<URLRequest> r(default_context_.CreateRequest( |
+ GURL("http://www.google.com:443/"), DEFAULT_PRIORITY, &d, NULL)); |
+ |
+ r->Start(); |
+ EXPECT_TRUE(r->is_pending()); |
+ |
+ base::RunLoop().Run(); |
+ |
+ EXPECT_FALSE(r->is_pending()); |
+ EXPECT_EQ(URLRequestStatus::FAILED, r->status().status()); |
+ EXPECT_EQ(ERR_UNSAFE_PORT, r->status().error()); |
+ } |
+} |
+ |
// Tests that redirection to an unsafe URL is allowed when it has been marked as |
// safe. |
TEST_F(URLRequestTestHTTP, UnsafeRedirectToWhitelistedUnsafeURL) { |