| Index: LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php
|
| diff --git a/LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php b/LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..aaa2eecd3f22bf2917cac75b74511d1a656b1f3c
|
| --- /dev/null
|
| +++ b/LayoutTests/http/tests/security/suborigins/suborigin-allow-in-http-header.php
|
| @@ -0,0 +1,26 @@
|
| +<?php
|
| +header("Content-Security-Policy: suborigin foobar");
|
| +?>
|
| +<!DOCTYPE html>
|
| +<html>
|
| +<head>
|
| +<title>Allow suborigin in HTTP header</title>
|
| +<script src="/resources/testharness.js"></script>
|
| +<script src="/resources/testharnessreport.js"></script>
|
| +</head>
|
| +<script>
|
| +window.onmessage = function() {
|
| + var iframe = document.getElementById('iframe');
|
| + var secret = '';
|
| + try {
|
| + secret = iframe.contentWindow.secret;
|
| + assert_equals(secret, "I am a secret", "The parent frame should be able to get the secret value from the child iframe.");
|
| + done();
|
| + } catch(e) {
|
| + assert_unreached();
|
| + done();
|
| + };
|
| +};
|
| +</script>
|
| +<iframe id="iframe" src="resources/childsuborigin.php?suborigin=foobar"></iframe>
|
| +</html>
|
|
|