Index: Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
diff --git a/Source/core/frame/csp/ContentSecurityPolicyTest.cpp b/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
index e748dbfa4605534b44675035fb94a5dfe67adeeb..960ec198f9c7c38893ec940dfab9603606a95e22 100644 |
--- a/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
+++ b/Source/core/frame/csp/ContentSecurityPolicyTest.cpp |
@@ -72,10 +72,10 @@ TEST_F(ContentSecurityPolicyTest, ParseMonitorInsecureRequestsEnabled) |
{ |
RuntimeEnabledFeatures::setExperimentalContentSecurityPolicyFeaturesEnabled(true); |
csp->didReceiveHeader("upgrade-insecure-requests", ContentSecurityPolicyHeaderTypeReport, ContentSecurityPolicyHeaderSourceHTTP); |
- EXPECT_EQ(SecurityContext::InsecureContentMonitor, csp->insecureContentPolicy()); |
+ EXPECT_EQ(SecurityContext::InsecureContentDoNotUpgrade, csp->insecureContentPolicy()); |
Yoav Weiss
2015/03/05 12:31:34
So in this case, we would also have an invalid pol
|
csp->bindToExecutionContext(document.get()); |
- EXPECT_EQ(SecurityContext::InsecureContentMonitor, document->insecureContentPolicy()); |
+ EXPECT_EQ(SecurityContext::InsecureContentDoNotUpgrade, document->insecureContentPolicy()); |
} |
} // namespace |