Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/form-action-none-and-reload.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/form-action-none-and-reload.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/form-action-none-and-reload.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..94942aed0f1c45f67c7fb0ad915af0863f2e9265 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/resources/form-action-none-and-reload.html |
@@ -0,0 +1,23 @@ |
+<html> |
+ <head> |
+ <meta http-equiv="Content-Security-Policy" content="form-action 'none'"> |
+ </head> |
+ <body> |
+ <script> |
+ window.addEventListener('securitypolicyviolation', function(event) { |
+ // Notify the parent frame or the parent window that the reload was |
+ // blocked by the CSP. |
+ let data = { |
+ "blockedURI":event.blockedURI, |
+ "effectiveDirective":event.effectiveDirective |
+ }; |
+ if (window.opener) |
+ window.opener.postMessage(data, "*"); |
+ else if (window.parent != window) |
+ window.parent.postMessage(data, "*"); |
+ }); |
+ |
+ location.reload(); |
+ </script> |
+ </body> |
+</html> |