| Index: content/test/data/cross_site_document_request_target.html
|
| diff --git a/content/test/data/cross_site_document_request_target.html b/content/test/data/cross_site_document_request_target.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..cd94fef3a679140a8bccadfe00294d1baa7e4be4
|
| --- /dev/null
|
| +++ b/content/test/data/cross_site_document_request_target.html
|
| @@ -0,0 +1,39 @@
|
| +<html>
|
| +<head>
|
| +<!-- favicon -->
|
| +<link rel="icon"
|
| + type="image/png"
|
| + href="http://bar.com/files/site_isolation/valid.html">
|
| +<!-- css -->
|
| +<link rel="stylesheet" type="text/css" href="http://bar.com/files/site_isolation/valid.html">
|
| +<!-- script -->
|
| +<script language="javascript" src="http://bar.com/files/site_isolation/valid.html"></script>
|
| +</head>
|
| +<body>
|
| +This page tests that the renderer process does not crash even the response that
|
| +it requested is blocked by SiteIsolationPolicy for various targets. This page
|
| +should be loaded on a domain other than bar.com to be different from the
|
| +requested resource here.
|
| +
|
| +image:<img src="http://bar.com/files/site_isolation/valid.html"></img><br/>
|
| +
|
| +
|
| +font:
|
| +<style media="screen" type="text/css">
|
| +@font-face {
|
| + font-family: "myfont";
|
| + src: url("http://bar.com/files/site_isolation/valid.html") format('woff');
|
| +}
|
| +</style><br/>
|
| +
|
| +<!-- The renderer creates an iframe for a file with .html extension, so this
|
| +doesn't go through SiteIsolationPolicy -->
|
| +embed:<embed src="http://bar.com/files/site_isolation/valid.html"></embed><br/>
|
| +
|
| +<!-- The renderer creates an iframe for a file with .html extension, so this
|
| +doesn't go through SiteIsolationPolicy -->
|
| +object:<object width="400" height="400"
|
| +data="http://bar.com/files/site_isolation/valid.html"></object><br/>
|
| +
|
| +</body>
|
| +</html>
|
|
|