Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt |
new file mode 100644 |
index 0000000000000000000000000000000000000000..e254dd7cbf1dcb1decacf40710f11716931cab3f |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-cross-origin-star-expected.txt |
@@ -0,0 +1,13 @@ |
+CONSOLE ERROR: line 11: Refused to load the image 'http://localhost:8000/security/contentSecurityPolicy/resources/green250x50.png' because it violates the following Content Security Policy directive: "img-src 'none'". |
+ |
+ALERT: Hello from iframe |
+Star Allow-CSP-From header allows the parent to enforce its Embedding CSP. |
+ |
+On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
+ |
+ |
+PASS The inner IFrame passed. |
+PASS successfullyParsed is true |
+ |
+TEST COMPLETE |
+ |