Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Use inner origin of blob: URLs to determine their trustworthiness.
This CL is removing special-casing of blob URLs from content::IsOriginSecure. After the CL, the inner origin of blob URLs will be extracted by network::IsUrlPotentiallyTrustworthy and passed to network::IsOriginPotentiallyTrustworthy (both of these network-layer functions follow https://www.w3.org/TR/powerful-features). The change above is desirable (blob URLs which were previously incorrectly always considered untrustworthy will be correctly judged based on their inner origin). OTOH, the change caused a test failure in PaymentRequestBlobUrlTest.ConnectionTerminated. As suggested by rouslan@ the CL just tweaks the test expectations of this test. I note that before this CL, PaymentRequestBlobUrlTest.ConnectionTerminated was exercising a scenario where the URL is insecure (and after this CL some blob URLs are considered secure based on their inner origin). Similar scenario is already tested by PaymentRequestDataUrlTest.SecurityError (pointed out by rouslan@ - thanks!) and therefore no test coverage is lost by tweaking the expectations of the PaymentRequestBlobUrlTest. Bug: 937451 Change-Id: I9cec22a13fe821eb39ea789e1128bc592267d986 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1506941 Reviewed-by: Rouslan Solomakhin <[email protected]> Reviewed-by: Alex Moshchuk <[email protected]> Auto-Submit: Łukasz Anforowicz <[email protected]> Commit-Queue: Łukasz Anforowicz <[email protected]> Cr-Commit-Position: refs/heads/master@{#643579}
- Loading branch information