| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/base-uri/base-uri-deny.sub.html
|
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/base-uri/base-uri-deny.sub.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/base-uri/base-uri-deny.sub.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..a5a78ae1a347930b759afbc1ec1ceac953eb9df7
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/base-uri/base-uri-deny.sub.html
|
| @@ -0,0 +1,25 @@
|
| +<!DOCTYPE html>
|
| +<html>
|
| +<head>
|
| + <meta http-equiv="Content-Security-Policy" content="base-uri {{location[scheme]}}://{{domains[www1]}}:{{ports[http][0]}}/">
|
| + <script src='/resources/testharness.js'></script>
|
| + <script src='/resources/testharnessreport.js'></script>
|
| +
|
| + <script>
|
| + var t = async_test("Check that baseURI fires a securitypolicyviolation event when it does not match the csp directive");
|
| + window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
|
| + assert_equals(e.blockedURI, "{{location[scheme]}}://{{domains[www2]}}:{{ports[http][0]}}/")
|
| + assert_equals(e.violatedDirective, "base-uri");
|
| + }));
|
| + </script>
|
| +
|
| + <base href="{{location[scheme]}}://{{domains[www2]}}:{{ports[http][0]}}/">
|
| + <script>
|
| + test(function() {
|
| + assert_equals(document.baseURI, window.location.href);
|
| + t.done();
|
| + }, "Check that the baseURI is not set when it does not match the csp directive");
|
| + </script>
|
| +</head>
|
| +<body>
|
| +</html>
|
|
|