Index: content/test/data/cross_site_document_request_target.html |
diff --git a/content/test/data/cross_site_document_request_target.html b/content/test/data/cross_site_document_request_target.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..cd94fef3a679140a8bccadfe00294d1baa7e4be4 |
--- /dev/null |
+++ b/content/test/data/cross_site_document_request_target.html |
@@ -0,0 +1,39 @@ |
+<html> |
+<head> |
+<!-- favicon --> |
+<link rel="icon" |
+ type="image/png" |
+ href="http://bar.com/files/site_isolation/valid.html"> |
+<!-- css --> |
+<link rel="stylesheet" type="text/css" href="http://bar.com/files/site_isolation/valid.html"> |
+<!-- script --> |
+<script language="javascript" src="http://bar.com/files/site_isolation/valid.html"></script> |
+</head> |
+<body> |
+This page tests that the renderer process does not crash even the response that |
+it requested is blocked by SiteIsolationPolicy for various targets. This page |
+should be loaded on a domain other than bar.com to be different from the |
+requested resource here. |
+ |
+image:<img src="http://bar.com/files/site_isolation/valid.html"></img><br/> |
+ |
+ |
+font: |
+<style media="screen" type="text/css"> |
+@font-face { |
+ font-family: "myfont"; |
+ src: url("http://bar.com/files/site_isolation/valid.html") format('woff'); |
+} |
+</style><br/> |
+ |
+<!-- The renderer creates an iframe for a file with .html extension, so this |
+doesn't go through SiteIsolationPolicy --> |
+embed:<embed src="http://bar.com/files/site_isolation/valid.html"></embed><br/> |
+ |
+<!-- The renderer creates an iframe for a file with .html extension, so this |
+doesn't go through SiteIsolationPolicy --> |
+object:<object width="400" height="400" |
+data="http://bar.com/files/site_isolation/valid.html"></object><br/> |
+ |
+</body> |
+</html> |