mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
Bug 663567 - Verify that content added by XSLT stylesheet is subject to document's CSP - test update. r=sstamm
--HG-- rename : content/base/test/file_CSP_bug663567_allows.xsl => content/base/test/file_CSP_bug663567.xsl
This commit is contained in:
parent
d4e6dbc9bb
commit
b7e5e00154
@ -651,7 +651,7 @@ MOCHITEST_FILES_C= \
|
||||
test_CSP_bug663567.html \
|
||||
file_CSP_bug663567_allows.xml \
|
||||
file_CSP_bug663567_allows.xml^headers^ \
|
||||
file_CSP_bug663567_allows.xsl \
|
||||
file_CSP_bug663567.xsl \
|
||||
file_CSP_bug663567_blocks.xml \
|
||||
file_CSP_bug663567_blocks.xml^headers^ \
|
||||
test_CSP_bug802872.html \
|
||||
|
@ -1,5 +1,5 @@
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?>
|
||||
<?xml-stylesheet type="text/xsl" href="file_CSP_bug663567_allows.xsl"?>
|
||||
<?xml-stylesheet type="text/xsl" href="file_CSP_bug663567.xsl"?>
|
||||
<catalog>
|
||||
<cd>
|
||||
<title>Empire Burlesque</title>
|
||||
|
@ -1,5 +1,5 @@
|
||||
<?xml version="1.0" encoding="ISO-8859-1"?>
|
||||
<?xml-stylesheet type="text/xsl" href="http://example.org/tests/content/base/test/file_CSP_bug663567_blocks.xsl"?>
|
||||
<?xml-stylesheet type="text/xsl" href="file_CSP_bug663567.xsl"?>
|
||||
<catalog>
|
||||
<cd>
|
||||
<title>Empire Burlesque</title>
|
||||
|
@ -1 +1 @@
|
||||
Content-Security-Policy: default-src 'self'
|
||||
Content-Security-Policy: default-src *.example.com
|
||||
|
@ -34,7 +34,7 @@ function checkAllowed () {
|
||||
* Content-Security-Policy: default-src 'self'
|
||||
*
|
||||
* we load the xsl file using:
|
||||
* <?xml-stylesheet type="text/xsl" href="file_CSP_bug663467_allows.xsl"?>
|
||||
* <?xml-stylesheet type="text/xsl" href="file_CSP_bug663467.xsl"?>
|
||||
*/
|
||||
try {
|
||||
var cspframe = document.getElementById('xsltframe');
|
||||
@ -49,11 +49,10 @@ function checkAllowed () {
|
||||
|
||||
function checkBlocked () {
|
||||
/* The policy for this test is:
|
||||
* Content-Security-Policy: default-src 'self'
|
||||
* Content-Security-Policy: default-src *.example.com
|
||||
*
|
||||
* we load the xsl file using:
|
||||
* <?xml-stylesheet type="text/xsl"
|
||||
* href="http://example.org/tests/content/base/test/file_CSP_bug663467_blocks.xsl"?>
|
||||
* <?xml-stylesheet type="text/xsl" href="file_CSP_bug663467.xsl"?>
|
||||
*/
|
||||
try {
|
||||
var cspframe = document.getElementById('xsltframe2');
|
||||
|
Loading…
Reference in New Issue
Block a user