| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/connect-src-xmlhttprequest-redirect-to-blocked.sub.html
 | 
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/connect-src-xmlhttprequest-redirect-to-blocked.sub.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/connect-src-xmlhttprequest-redirect-to-blocked.sub.html
 | 
| new file mode 100644
 | 
| index 0000000000000000000000000000000000000000..6fc0769b618e8355e2d84ba9ea100c2bc746f563
 | 
| --- /dev/null
 | 
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/blink-contrib/connect-src-xmlhttprequest-redirect-to-blocked.sub.html
 | 
| @@ -0,0 +1,45 @@
 | 
| +<!DOCTYPE html>
 | 
| +<html>
 | 
| +
 | 
| +<head>
 | 
| +    <!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
 | 
| +    <title>connect-src-xmlhttprequest-redirect-to-blocked</title>
 | 
| +    <script src="/resources/testharness.js"></script>
 | 
| +    <script src="/resources/testharnessreport.js"></script>
 | 
| +    <script src='../support/logTest.sub.js?logs=["PASS XMLHttpRequest.send() did not follow the disallowed redirect.","TEST COMPLETE"]'></script>
 | 
| +    <script src="../support/alertAssert.sub.js?alerts=[]"></script>
 | 
| +    <!-- enforcing policy:
 | 
| +connect-src 'self'; script-src 'self' 'unsafe-inline';
 | 
| +-->
 | 
| +    <script id="inject_here"></script>
 | 
| +</head>
 | 
| +
 | 
| +<body>
 | 
| +    <script>
 | 
| +        var xhr = new XMLHttpRequest;
 | 
| +        try {
 | 
| +            xhr.open("GET", "/common/redirect.py?location=http://www1.{{host}}:{{ports[http][0]}}/content-security-policy/support/fail.asis", true);
 | 
| +        } catch (e) {
 | 
| +            log("FAIL " + "XMLHttpRequest.open() should not throw an exception.");
 | 
| +        }
 | 
| +        xhr.onload = function() {
 | 
| +            //cons/**/ole.log(xhr.responseText);
 | 
| +            if(xhr.responseText == "FAIL") {
 | 
| +                log("FAIL " + "XMLHttpRequest.send() should fail to follow the disallowed redirect.");
 | 
| +            } else {
 | 
| +                log("PASS " + "XMLHttpRequest.send() did not follow the disallowed redirect.");
 | 
| +            }
 | 
| +            log("TEST COMPLETE");
 | 
| +        };
 | 
| +        xhr.onerror = function() {
 | 
| +            log("PASS " + "XMLHttpRequest.send() did not follow the disallowed redirect.");
 | 
| +            log("TEST COMPLETE");
 | 
| +        };
 | 
| +        xhr.send();
 | 
| +
 | 
| +    </script>
 | 
| +    <div id="log"></div>
 | 
| +    <script async defer src="../support/checkReport.sub.js?reportExists=true&reportField=violated-directive&reportValue=connect-src%20'self'/security/contentSecurityPolicy/resources/redir.php"></script>
 | 
| +</body>
 | 
| +
 | 
| +</html>
 | 
| 
 |