| Index: LayoutTests/http/tests/security/xssAuditor/html5-import-CORS.html
|
| diff --git a/LayoutTests/http/tests/security/xssAuditor/html5-import-CORS.html b/LayoutTests/http/tests/security/xssAuditor/html5-import-CORS.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..45dd424b01d8b23917a5914518b96aaa53196aad
|
| --- /dev/null
|
| +++ b/LayoutTests/http/tests/security/xssAuditor/html5-import-CORS.html
|
| @@ -0,0 +1,17 @@
|
| +<!DOCTYPE html>
|
| +<html>
|
| +<head>
|
| +<script>
|
| +if (window.testRunner) {
|
| + testRunner.dumpAsText();
|
| + testRunner.setXSSAuditorEnabled(true);
|
| +}
|
| +</script>
|
| +</head>
|
| +<body>
|
| +<iframe src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3clink%20rel=%22import%22%20href=%22http://127.0.0.1:8000/security/xssAuditor/resources/xss.js%22%3e">
|
| +</iframe>
|
| +<p>This test passes if the XSSAuditor blocks the load prior to the CORS restriction kicking in. We've not bothered to enable
|
| +CORS for this test, unlike what a real attacker would do, so a CORS error here means failure.
|
| +</body>
|
| +</html>
|
|
|