Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html |
deleted file mode 100644 |
index 4c8eccc0ab26d46d84943652bde6fa1d98540ea7..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html |
+++ /dev/null |
@@ -1,15 +0,0 @@ |
-<!DOCTYPE html> |
-<html> |
-<head> |
- <script src="/js-test-resources/js-test.js"></script> |
- <script src="../../resources/frame-ancestors-test.js"></script> |
-</head> |
-<body> |
- <script> |
- description("A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate."); |
- |
- debug("Note that we can't distinguish blocked URLs from allowed cross-origin URLs due to the same-origin policy. This test passes if no console message declares that the frame was blocked."); |
- testNestedIFrame(SAMEORIGIN_ORIGIN + " " + CROSSORIGIN_ORIGIN, SAME_ORIGIN, CROSS_ORIGIN, EXPECT_BLOCK); |
- </script> |
-</body> |
-</html> |