OLD | NEW |
(Empty) | |
| 1 <!DOCTYPE html> |
| 2 <html> |
| 3 |
| 4 <head> |
| 5 <!-- Programmatically converted from a WebKit Reftest, please forgive result
ing idiosyncracies.--> |
| 6 <title>connect-src-xmlhttprequest-redirect-to-blocked</title> |
| 7 <script src="/resources/testharness.js"></script> |
| 8 <script src="/resources/testharnessreport.js"></script> |
| 9 <script src='../support/logTest.sub.js?logs=["PASS XMLHttpRequest.send() did
not follow the disallowed redirect.","TEST COMPLETE"]'></script> |
| 10 <script src="../support/alertAssert.sub.js?alerts=[]"></script> |
| 11 <!-- enforcing policy: |
| 12 connect-src 'self'; script-src 'self' 'unsafe-inline'; |
| 13 --> |
| 14 <script id="inject_here"></script> |
| 15 </head> |
| 16 |
| 17 <body> |
| 18 <script> |
| 19 var xhr = new XMLHttpRequest; |
| 20 try { |
| 21 xhr.open("GET", "/common/redirect.py?location=http://www1.{{host}}:{
{ports[http][0]}}/content-security-policy/support/fail.asis", true); |
| 22 } catch (e) { |
| 23 log("FAIL " + "XMLHttpRequest.open() should not throw an exception."
); |
| 24 } |
| 25 xhr.onload = function() { |
| 26 //cons/**/ole.log(xhr.responseText); |
| 27 if(xhr.responseText == "FAIL") { |
| 28 log("FAIL " + "XMLHttpRequest.send() should fail to follow the d
isallowed redirect."); |
| 29 } else { |
| 30 log("PASS " + "XMLHttpRequest.send() did not follow the disallow
ed redirect."); |
| 31 } |
| 32 log("TEST COMPLETE"); |
| 33 }; |
| 34 xhr.onerror = function() { |
| 35 log("PASS " + "XMLHttpRequest.send() did not follow the disallowed r
edirect."); |
| 36 log("TEST COMPLETE"); |
| 37 }; |
| 38 xhr.send(); |
| 39 |
| 40 </script> |
| 41 <div id="log"></div> |
| 42 <script async defer src="../support/checkReport.sub.js?reportExists=true&
;reportField=violated-directive&reportValue=connect-src%20'self'/s
ecurity/contentSecurityPolicy/resources/redir.php"></script> |
| 43 </body> |
| 44 |
| 45 </html> |
OLD | NEW |