| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow-expected.txt
|
| deleted file mode 100644
|
| index 4b905a8180bbe2746f31c9ceb252efd2761f8dd9..0000000000000000000000000000000000000000
|
| --- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow-expected.txt
|
| +++ /dev/null
|
| @@ -1,27 +0,0 @@
|
| -CONSOLE MESSAGE: line 64: IFrame load event fired: the IFrame's location is 'http://127.0.0.1:8000/security/contentSecurityPolicy/resources/frame-ancestors.pl?policy=*.0.0.1:8000'.
|
| -A 'frame-ancestors' CSP directive with a value '*.0.0.1' should allow render in same-origin nested frames.
|
| -
|
| -On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| -
|
| -
|
| -PASS The inner IFrame passed.
|
| -PASS successfullyParsed is true
|
| -
|
| -TEST COMPLETE
|
| -
|
| -
|
| ---------
|
| -Frame: '<!--framePath //<!--frame0-->-->'
|
| ---------
|
| -Testing a same-origin child with a policy of "*.0.0.1:8000" nested in a same-origin parent.
|
| -
|
| -On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
|
| -
|
| -
|
| -PASS The IFrame should not have been blocked. It wasn't.
|
| -
|
| -
|
| ---------
|
| -Frame: '<!--framePath //<!--frame0-->/<!--frame0-->-->'
|
| ---------
|
| -This is an IFrame sending a Content Security Policy header containing "frame-ancestors *.0.0.1:8000".
|
|
|