| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/support/testharness-helper.js
|
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/support/testharness-helper.js b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/support/testharness-helper.js
|
| index a1eaa891e03187e8e81bd86f6adaab4ea425f07a..3c296800f8f0aed1adeaab34fce5f04d13f3470b 100644
|
| --- a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/support/testharness-helper.js
|
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/support/testharness-helper.js
|
| @@ -1,5 +1,5 @@
|
| function assert_no_csp_event_for_url(test, url) {
|
| - document.addEventListener("securitypolicyviolation", test.step_func(e => {
|
| + self.addEventListener("securitypolicyviolation", test.step_func(e => {
|
| if (e.blockedURI !== url)
|
| return;
|
| assert_unreached("SecurityPolicyViolation event fired for " + url);
|
| @@ -12,7 +12,7 @@ function assert_no_event(test, obj, name) {
|
|
|
| function waitUntilCSPEventForURL(test, url) {
|
| return new Promise((resolve, reject) => {
|
| - document.addEventListener("securitypolicyviolation", test.step_func(e => {
|
| + self.addEventListener("securitypolicyviolation", test.step_func(e => {
|
| if (e.blockedURI == url)
|
| resolve(e);
|
| }));
|
| @@ -128,4 +128,3 @@ function assert_service_worker_is_blocked(url, description) {
|
| ]);
|
| }, description);
|
| }
|
| -
|
|
|