Chromium Code Reviews| Index: Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
| diff --git a/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
| index e748dbfa4605534b44675035fb94a5dfe67adeeb..960ec198f9c7c38893ec940dfab9603606a95e22 100644 |
| --- a/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
| +++ b/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
| @@ -72,10 +72,10 @@ TEST_F(ContentSecurityPolicyTest, ParseMonitorInsecureRequestsEnabled) |
| { |
| RuntimeEnabledFeatures::setExperimentalContentSecurityPolicyFeaturesEnabled(true); |
| csp->didReceiveHeader("upgrade-insecure-requests", ContentSecurityPolicyHeaderTypeReport, ContentSecurityPolicyHeaderSourceHTTP); |
| - EXPECT_EQ(SecurityContext::InsecureContentMonitor, csp->insecureContentPolicy()); |
| + EXPECT_EQ(SecurityContext::InsecureContentDoNotUpgrade, csp->insecureContentPolicy()); |
|
Yoav Weiss
2015/03/05 12:31:34
So in this case, we would also have an invalid pol
|
| csp->bindToExecutionContext(document.get()); |
| - EXPECT_EQ(SecurityContext::InsecureContentMonitor, document->insecureContentPolicy()); |
| + EXPECT_EQ(SecurityContext::InsecureContentDoNotUpgrade, document->insecureContentPolicy()); |
| } |
| } // namespace |