Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scriptnonce-ignore-unsafeinline.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scriptnonce-ignore-unsafeinline.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scriptnonce-ignore-unsafeinline.html |
deleted file mode 100644 |
index 188df57f75cd6117d9f5d004904a9f0203252485..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/scriptnonce-ignore-unsafeinline.html |
+++ /dev/null |
@@ -1,24 +0,0 @@ |
-<!DOCTYPE html> |
-<html> |
- <head> |
- <meta http-equiv="Content-Security-Policy" content="script-src 'nonce-noncynonce' 'nonce-noncy+/=nonce' 'unsafe-inline'"> |
- <script nonce="noncynonce"> |
- if (window.testRunner) |
- testRunner.dumpAsText(); |
- </script> |
- <script nonce="noncynonce"> |
- alert('PASS (1/2)'); |
- </script> |
- <script nonce="noncy+/=nonce"> |
- alert('PASS (2/2)'); |
- </script> |
- <script> |
- alert('FAIL (1/1)'); |
- </script> |
- </head> |
- <body> |
- <p> |
- This tests that a valid nonce disables inline JavaScript, even if 'unsafe-inline' is present. |
- </p> |
- </body> |
-</html> |