Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/frame-src-cross-origin-load.sub.html |
diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/frame-src-cross-origin-load.sub.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/frame-src-cross-origin-load.sub.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..5238e7c0f9d0ab2f925add2a0a984c982e43f2fa |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/frame-src-cross-origin-load.sub.html |
@@ -0,0 +1,66 @@ |
+<!DOCTYPE html> |
+<html> |
+ |
+<head> |
+ <!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.--> |
+ <title>frame-src-cross-origin-load</title> |
+ <script src="/resources/testharness.js"></script> |
+ <script src="/resources/testharnessreport.js"></script> |
+ <script src='../support/logTest.sub.js?logs=["PASS IFrame %231 generated a load event.","PASS IFrame %232 generated a load event.","PASS IFrame %233 generated a load event."]'></script> |
+ <script> |
+ window.addEventListener("message", function(event) { |
+ alert_assert(event.data); |
+ }, false); |
+ |
+ var t_alert = async_test('Expecting alerts: ["PASS","PASS"]'); |
+ var expected_alerts = ["PASS", "PASS"]; |
+ |
+ function alert_assert(msg) { |
+ t_alert.step(function() { |
+ if (msg.match(/^FAIL/i)) { |
+ assert_unreached(msg); |
+ t_alert.done(); |
+ } |
+ for (var i = 0; i < expected_alerts.length; i++) { |
+ if (expected_alerts[i] == msg) { |
+ assert_true(expected_alerts[i] == msg); |
+ expected_alerts.splice(i, 1); |
+ if (expected_alerts.length == 0) { |
+ t_alert.done(); |
+ } |
+ return; |
+ } |
+ } |
+ assert_unreached('unexpected alert: ' + msg); |
+ t_alert.done(); |
+ }); |
+ } |
+ |
+ </script> |
+ <!-- enforcing policy: |
+frame-src 'self' http://www1.{{host}}:{{ports[http][0]}}; script-src 'self' 'unsafe-inline'; connect-src 'self'; |
+--> |
+ <p> |
+ IFrames blocked by CSP should generate a 'load', not 'error' event, regardless of blocked state. This means they appear to be normal cross-origin loads, thereby not leaking URL information directly to JS. |
+ </p> |
+ <script> |
+ window.wasPostTestScriptParsed = true; |
+ var loads = 0; |
+ |
+ function loadEvent() { |
+ loads++; |
+ log("PASS " + "IFrame #" + loads + " generated a load event."); |
+ } |
+ |
+ </script> |
+</head> |
+ |
+<body> |
+ <iframe src="resources/postmessage-pass.html" onload="loadEvent()"></iframe> |
+ <iframe src="http://www1.{{host}}:{{ports[http][0]}}/content-security-policy/blink-contrib/resources/postmessage-pass.html" onload="loadEvent()"></iframe> |
+ <iframe src="http://www2.{{host}}:{{ports[http][0]}}/content-security-policy/blink-contrib/resources/postmessage-fail.html" onload="loadEvent()" onerror="log('FAIL')"></iframe> |
+ <div id="log"></div> |
+ <script async defer src="../support/checkReport.sub.js?reportExists=true&reportField=violated-directive&reportValue=frame-src%20'self'http://www1.{{host}}:{{ports[http][0]}}"></script> |
+</body> |
+ |
+</html> |