Index: LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html |
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html |
similarity index 65% |
copy from LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html |
copy to LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html |
index ec2aeafce70a78e3ba8bfdd5cfcaa13dc9dbb623..59abde4794e96fe9ca7ef9af6ee2a713fe89066e 100644 |
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html |
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html |
@@ -6,9 +6,9 @@ |
</head> |
<body> |
<script> |
- description("A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames."); |
+ description("A 'frame-ancestors' CSP directive with a value '*.0.0.1' should allow render in same-origin nested frames."); |
- testNestedIFrame("'self'", CROSS_ORIGIN, CROSS_ORIGIN, EXPECT_BLOCK); |
+ testNestedIFrame("*.0.0.1:8000", SAME_ORIGIN, SAME_ORIGIN, EXPECT_LOAD); |
</script> |
</body> |
</html> |