OLD | NEW |
(Empty) | |
| 1 <!DOCTYPE html> |
| 2 <html> |
| 3 |
| 4 <head> |
| 5 <!-- Programmatically converted from a WebKit Reftest, please forgive result
ing idiosyncracies.--> |
| 6 <title>form-action-src-redirect-blocked</title> |
| 7 <script src="/resources/testharness.js"></script> |
| 8 <script src="/resources/testharnessreport.js"></script> |
| 9 <script src='../support/logTest.sub.js?logs=["TEST COMPLETE"]'></script> |
| 10 <script src="../support/alertAssert.sub.js?alerts=[]"></script> |
| 11 <!-- enforcing policy: |
| 12 form-action 'self'; script-src 'self' 'unsafe-inline'; connect-src 'self'; |
| 13 --> |
| 14 <script> |
| 15 window.addEventListener("message", function(event) { |
| 16 alert_assert(event.data); |
| 17 }, false); |
| 18 window.addEventListener('load', function() { |
| 19 setTimeout(function() { |
| 20 document.getElementById('submit').click(); |
| 21 log("TEST COMPLETE"); |
| 22 }, 0); |
| 23 }); |
| 24 setTimeout(function() {}, 1000); |
| 25 |
| 26 </script> |
| 27 </head> |
| 28 |
| 29 <body> |
| 30 <iframe name="test_target" id="test_iframe"></iframe> |
| 31 |
| 32 <form id="form1" action="/common/redirect.py?location=http://www1.{{host}}:{
{ports[http][0]}}/content-security-policy/blink-contrib/resources/postmessage-fa
il.html" method="post" target="test_target"> |
| 33 <input type="text" name="fieldname" value="fieldvalue"> |
| 34 <input type="submit" id="submit" value="submit"> |
| 35 </form> |
| 36 <p>Tests that blocking a POST form with a redirect works correctly. If this
test passes, a CSP violation will be generated.</p> |
| 37 <div id="log"></div> |
| 38 <script async defer src="../support/checkReport.sub.js?reportExists=true&
;reportField=violated-directive&reportValue=form-action%20'self'"></script> |
| 39 </body> |
| 40 |
| 41 </html> |
OLD | NEW |