| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/svg/svg-inline.sub.html
|
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/svg/svg-inline.sub.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/svg/svg-inline.sub.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..7beb295f14b2c5b18eccbd01c4e24101f77f26a2
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/svg/svg-inline.sub.html
|
| @@ -0,0 +1,34 @@
|
| +<!DOCTYPE html>
|
| +<html>
|
| +<head>
|
| + <title>svg-policy-with-resource</title>
|
| + <script src="/resources/testharness.js"></script>
|
| + <script src="/resources/testharnessreport.js"></script>
|
| +</head>
|
| +
|
| +<body>
|
| + <p>Tests that an SVG loaded in an iframe with a policy enforces it, not
|
| + the policy enforced by this parent frame. The SVG should render and
|
| + not redirect to a different resource.</p>
|
| + <div id="log"></div>
|
| + <?xml version="1.0" standalone="no"?>
|
| +<svg width="6cm" height="5cm" viewBox="0 0 600 500"
|
| + xmlns="http://www.w3.org/2000/svg" version="1.1">
|
| +
|
| + <script type="application/ecmascript"
|
| + xlink:href="http://www1.{{host}}:{{ports[http][0]}}/content-security-policy/support/.js">
|
| + </script>
|
| +
|
| + <circle cx="300" cy="225" r="100" fill="lawngreen"/>
|
| +
|
| + <text x="300" y="250"
|
| + font-family="Verdana"
|
| + font-size="50"
|
| + text-anchor="middle">
|
| + PASS
|
| + </text>
|
| +</svg>
|
| +
|
| + <script async defer src='../support/checkReport.sub.js?reportField=violated-directive&reportValue=script-src%20%27self%27+%27unsafe-inline%27'></script>
|
| +</body>
|
| +</html>
|
|
|