| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star.html
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..3e46dec1fcac178b0474611ecd6089672f1a6cf0
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star.html
|
| @@ -0,0 +1,14 @@
|
| +<head>
|
| + <script src="/js-test-resources/js-test.js"></script>
|
| + <script src="/security/contentSecurityPolicy/resources/child-src-test.js"></script>
|
| +</head>
|
| +<body>
|
| + <script>
|
| + description("Star Allow-CSP-From header allows the parent to enforce its Embedding CSP.");
|
| + csp = "script-src 'unsafe-inline'; img-src 'none'";
|
| + // localhost is cross-origin for http://127.0.0.1
|
| + url = "http://localhost:8000/security/contentSecurityPolicy/resources/respond-with-allow-csp-from-header.php?allow_csp_from=" + "*" + "&csp=img-src *";
|
| + injectFrameWithCSP(url, csp, EXPECT_LOAD, CROSS_ORIGIN);
|
| + </script>
|
| +</body>
|
| +</html>
|
|
|