Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3)

Side by Side Diff: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-multiple-star-expected.txt

Issue 2404373003: Experimental Feature: Allow-CSP-From header (Closed)
Patch Set: Changing to parentSecurityOrigin Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 CONSOLE ERROR: line 13: Refused to frame 'http://127.0.0.1:8000/security/content SecurityPolicy/resources/alert-fail.html' because it violates the following Cont ent Security Policy directive: "child-src 'none'". 1 Only the first header is used if multiple Allow-CSP-From headers are supplied.
2 2
3 Frames should be governed by 'child-src'.
4
5 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE ". 3 On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE ".
6 4
7 5
8 IFrame load event fired: the IFrame is cross-origin (or was blocked). 6 IFrame load event fired: the IFrame is cross-origin (or was blocked).
9 PASS The IFrame should have been blocked (or cross-origin). It was. 7 PASS The IFrame should have been blocked (or cross-origin). It was.
10 PASS successfullyParsed is true 8 PASS successfullyParsed is true
11 9
12 TEST COMPLETE 10 TEST COMPLETE
13 11
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698