| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_from-header.html
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_from-header.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_from-header.html
|
| index 6c5d8c67c2998c5b278e36a23c36c60ec1ec5530..c1f81495fd8129fcb870f4d132e7248884ff3062 100644
|
| --- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_from-header.html
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/allow_csp_from-header.html
|
| @@ -7,9 +7,6 @@
|
| </head>
|
| <body>
|
| <script>
|
| - var imgLineNumber = 20;
|
| - var scriptAbcLineNumber = 21;
|
| -
|
| async_test(t => {
|
| csp = "img-src 'none'; script-src 'unsafe-inline';";
|
| url = generateUrlWithAllowCSPFrom(SAME_ORIGIN, "");
|
| @@ -51,7 +48,6 @@
|
| if (e.source != i.contentWindow || e.data["securitypolicyviolation"] != true)
|
| return;
|
| assert_equals(e.data["blockedURI"], "inline");
|
| - assert_equals(e.data["lineNumber"], scriptAbcLineNumber);
|
| t.done();
|
| }));
|
|
|
| @@ -70,7 +66,6 @@
|
| return;
|
| assert_equals(e.data["blockedURI"],
|
| "http://localhost:8000/security/contentSecurityPolicy/resources/green250x50.png");
|
| - assert_equals(e.data["lineNumber"], imgLineNumber);
|
| t.done();
|
| }));
|
|
|
| @@ -79,11 +74,7 @@
|
|
|
| async_test(t => {
|
| csp = "script-src 'unsafe-inline'; img-src 'none'";
|
| - url = "http://localhost:8000/security/contentSecurityPolicy/resources/respond-with-allow-csp-from-multiple-headers.php?allow_csp_from=";
|
| - var i = document.createElement('iframe');
|
| - i.csp = csp;
|
| - i.src = url + "http://localhost:8000" + "&allow_csp_from_2=*";
|
| -
|
| + url = "http://localhost:8000/security/contentSecurityPolicy/resources/respond-with-allow-csp-from-multiple-headers.php?allow_csp_from=" + "http://localhost:8000" + "&allow_csp_from_2=*";
|
| injectIframeWithCSP(url, EXPECT_BLOCK, csp, t, "7");
|
| }, "Only first Allow-CSP-From header is considered.");
|
| </script>
|
|
|