Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-enforcement-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-enforcement-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-enforcement-expected.txt |
new file mode 100644 |
index 0000000000000000000000000000000000000000..37b31ea7badb70cfd48f43f0c2adbef987991bfb |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-enforcement-expected.txt |
@@ -0,0 +1,13 @@ |
+CONSOLE ERROR: line 11: Refused to load the image 'http://localhost:8000/security/contentSecurityPolicy/resources/green250x50.png' because it violates the following Content Security Policy directive: "img-src 'none'". |
+ |
+ALERT: Hello from iframe |
+Allow-CSP-From header enforces new policies from the parent. |
+ |
+On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
+ |
+ |
+PASS The inner IFrame passed. |
+PASS successfullyParsed is true |
+ |
+TEST COMPLETE |
+ |