Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(118)

Unified Diff: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin.html

Issue 2404373003: Experimental Feature: Allow-CSP-From header (Closed)
Patch Set: Changing to parentSecurityOrigin Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin.html
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin.html
new file mode 100644
index 0000000000000000000000000000000000000000..539e31d2c72f8beb2fa06d95840d976cf7a81c63
--- /dev/null
+++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_header-same-origin.html
@@ -0,0 +1,13 @@
+<head>
+ <script src="/js-test-resources/js-test.js"></script>
+ <script src="/security/contentSecurityPolicy/resources/child-src-test.js"></script>
+</head>
+<body>
+ <script>
+ description("Same origin iframes are Allowed and required CSP is appended to the list of response's CSP list.");
+ csp = "img-src 'none'; script-src 'unsafe-inline';";
+ url = "http://127.0.0.1:8000/security/contentSecurityPolicy/resources/respond-with-allow-csp-from-header.php";
+ injectFrameWithCSP(url, csp, EXPECT_LOAD, SAME_ORIGIN);
Mike West 2016/10/14 09:08:20 We'll also need to test that the policy was applie
+ </script>
+</body>
+</html>

Powered by Google App Engine
This is Rietveld 408576698