| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html
|
| deleted file mode 100644
|
| index 4c8eccc0ab26d46d84943652bde6fa1d98540ea7..0000000000000000000000000000000000000000
|
| --- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html
|
| +++ /dev/null
|
| @@ -1,15 +0,0 @@
|
| -<!DOCTYPE html>
|
| -<html>
|
| -<head>
|
| - <script src="/js-test-resources/js-test.js"></script>
|
| - <script src="../../resources/frame-ancestors-test.js"></script>
|
| -</head>
|
| -<body>
|
| - <script>
|
| - description("A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.");
|
| -
|
| - debug("Note that we can't distinguish blocked URLs from allowed cross-origin URLs due to the same-origin policy. This test passes if no console message declares that the frame was blocked.");
|
| - testNestedIFrame(SAMEORIGIN_ORIGIN + " " + CROSSORIGIN_ORIGIN, SAME_ORIGIN, CROSS_ORIGIN, EXPECT_BLOCK);
|
| - </script>
|
| -</body>
|
| -</html>
|
|
|