| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..6229b2c143d031b6a6de3f5108aec33e0402b493
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin-expected.txt
|
| @@ -0,0 +1,14 @@
|
| +CONSOLE ERROR: line 11: Refused to load the image 'http://127.0.0.1:8000/security/contentSecurityPolicy/resources/green250x50.png' because it violates the following Content Security Policy directive: "img-src 'none'".
|
| +
|
| +ALERT: Hello from iframe
|
| +CONSOLE MESSAGE: line 24: IFrame load event fired: the IFrame's location is 'http://127.0.0.1:8000/security/contentSecurityPolicy/resources/respond-with-allow-csp-from-header.php'.
|
| +Same origin iframes are Allowed and required CSP is appended to the list of response's CSP list.
|
| +
|
| +On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| +
|
| +
|
| +PASS The IFrame should not have been blocked. It wasn't.
|
| +PASS successfullyParsed is true
|
| +
|
| +TEST COMPLETE
|
| +
|
|
|