Index: LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html |
diff --git a/LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html b/LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..f1db7c7871f4d7724699d311426eff58fa3b0107 |
--- /dev/null |
+++ b/LayoutTests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-inline-style.html |
@@ -0,0 +1,15 @@ |
+<!DOCTYPE html> |
+<html> |
+<head> |
+ <meta http-equiv="Content-Security-Policy" content="default-src 'none'; script-src 'self' 'unsafe-eval'"> |
+ <script src="./resources/bypass-main-world-csp-for-inline-style.js"></script> |
+</head> |
+<body> |
+ <p> |
+ This test ensures that style applied in isolated worlds marked with |
+ their own Content Security Policy aren't affected by the page's content |
+ security policy. Extensions, for example, should be able to inject |
+ inline CSS (even though it's probably a bad idea to do so). |
+ </p> |
+</body> |
+</html> |