| <html> |
| <meta http-equiv="Accept-CH" content="DPR, Width, Viewport-Width, Device-Memory, rtt, downlink, ect"> |
| <title>Accept-CH http-equiv insecure transport test</title> |
| <body> |
| <script src="/resources/testharness.js"></script> |
| <script src="/resources/testharnessreport.js"></script> |
| |
| <script> |
| |
| // Even though this HTML file contains "Accept-CH" http-equiv headers, the |
| // browser should NOT attach the specified client hints in the HTTP request |
| // headers since the page is being fetched over an insecure transport. |
| // Test this functionality by fetching an XHR from this page hosted on |
| // an insecure HTTP server. |
| |
| // echo_client_hints_received.py sets the response headers depending on the set |
| // of client hints it receives in the request headers. |
| |
| promise_test(t => { |
| return fetch("/client-hints/echo_client_hints_received.py").then(r => { |
| assert_equals(r.status, 200) |
| // Verify that the browser does not include client hints in the headers |
| // when fetching the XHR from an insecure HTTP server. |
| assert_false(r.headers.has("device-memory-received"), "device-memory-received"); |
| assert_false(r.headers.has("dpr-received"), "dpr-received"); |
| assert_false(r.headers.has("viewport-width-received"), "viewport-width-received"); |
| assert_false(r.headers.has("rtt-received"), "rtt-received"); |
| assert_false(r.headers.has("downlink-received"), "downlink-received"); |
| assert_false(r.headers.has("ect-received"), "ect-received"); |
| }); |
| }, "Accept-CH http-equiv test over insecure transport"); |
| |
| </script> |
| </body> |
| </html> |