| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..e254dd7cbf1dcb1decacf40710f11716931cab3f
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt
|
| @@ -0,0 +1,13 @@
|
| +CONSOLE ERROR: line 11: Refused to load the image 'http://localhost:8000/security/contentSecurityPolicy/resources/green250x50.png' because it violates the following Content Security Policy directive: "img-src 'none'".
|
| +
|
| +ALERT: Hello from iframe
|
| +Star Allow-CSP-From header allows the parent to enforce its Embedding CSP.
|
| +
|
| +On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| +
|
| +
|
| +PASS The inner IFrame passed.
|
| +PASS successfullyParsed is true
|
| +
|
| +TEST COMPLETE
|
| +
|
|
|