| Index: LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html
|
| diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html
|
| similarity index 65%
|
| copy from LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html
|
| copy to LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html
|
| index ec2aeafce70a78e3ba8bfdd5cfcaa13dc9dbb623..59abde4794e96fe9ca7ef9af6ee2a713fe89066e 100644
|
| --- a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html
|
| +++ b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-protocolless-allow.html
|
| @@ -6,9 +6,9 @@
|
| </head>
|
| <body>
|
| <script>
|
| - description("A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.");
|
| + description("A 'frame-ancestors' CSP directive with a value '*.0.0.1' should allow render in same-origin nested frames.");
|
|
|
| - testNestedIFrame("'self'", CROSS_ORIGIN, CROSS_ORIGIN, EXPECT_BLOCK);
|
| + testNestedIFrame("*.0.0.1:8000", SAME_ORIGIN, SAME_ORIGIN, EXPECT_LOAD);
|
| </script>
|
| </body>
|
| </html>
|
|
|