| Index: LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html
|
| diff --git a/LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html b/LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..f1db7c7871f4d7724699d311426eff58fa3b0107
|
| --- /dev/null
|
| +++ b/LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html
|
| @@ -0,0 +1,15 @@
|
| +<!DOCTYPE html>
|
| +<html>
|
| +<head>
|
| + <meta http-equiv="Content-Security-Policy" content="default-src 'none'; script-src 'self' 'unsafe-eval'">
|
| + <script src="./resources/bypass-main-world-csp-for-inline-style.js"></script>
|
| +</head>
|
| +<body>
|
| + <p>
|
| + This test ensures that style applied in isolated worlds marked with
|
| + their own Content Security Policy aren't affected by the page's content
|
| + security policy. Extensions, for example, should be able to inject
|
| + inline CSS (even though it's probably a bad idea to do so).
|
| + </p>
|
| +</body>
|
| +</html>
|
|
|