Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html |
similarity index 50% |
rename from third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html |
rename to third_party/WebKit/LayoutTests/external/wpt/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html |
index 30a76d298a1cbbf5e98e04ce52849d3e74fa646b..654e90e0b82da301dfa655b8fd48d5e74a7327a8 100644 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html |
+++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html |
@@ -1,12 +1,13 @@ |
<!DOCTYPE html> |
<html> |
<head> |
- <script src="/js-test-resources/js-test.js"></script> |
- <script src="../../resources/frame-ancestors-test.js"></script> |
+ <script src="/resources/testharness.js"></script> |
+ <script src="/resources/testharnessreport.js"></script> |
+ <script src="support/frame-ancestors-test.sub.js"></script> |
</head> |
<body> |
<script> |
- description("A 'frame-ancestors' CSP directive with a URL value should compare against each frame's origin rather than URL, " + |
+ test = async_test("A 'frame-ancestors' CSP directive with a URL value should compare against each frame's origin rather than URL, " + |
"so a nested frame with a sandboxed parent frame should be blocked due to the parent having a unique origin."); |
testNestedSandboxedIFrame(SAMEORIGIN_ORIGIN + " " + CROSSORIGIN_ORIGIN, CROSS_ORIGIN, CROSS_ORIGIN, EXPECT_BLOCK); |