| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-handler-allowed-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-handler-allowed-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-handler-allowed-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..3223c033c900d67457742a751828f09365d8cda5
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scripthash-handler-allowed-expected.txt
|
| @@ -0,0 +1,8 @@
|
| +CONSOLE ERROR: line 31: Refused to execute inline event handler because it violates the following Content Security Policy directive: "script-src 'sha256-nhtYaXCssBJTThiDLYewspQYue9tisulEwJ3nTJKcMI='". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution.
|
| +
|
| +
|
| +This is a testharness.js-based test.
|
| +PASS Inline event handlers whitelisted by the policy should fire.
|
| +PASS Inline event handlers not whitelisted by the policy should generate error events.
|
| +Harness: the test ran to completion.
|
| +
|
|
|