servo/tests/wpt/meta/content-security-policy/navigation/to-javascript-parent-initiated-parent-csp.html.ini
Tim van der Lippe 539ca27284
Propagate parent policy container to local iframes (#36710)
This follows the rules as defined in
https://w3c.github.io/webappsec-csp/#security-inherit-csp
where local iframes (about:blank and about:srcdoc) should
initially start with the CSP rules of the parent. After
that, all new CSP headers should only be set on the
policy container of the iframe.

Part of #36437

Signed-off-by: Tim van der Lippe <tvanderlippe@gmail.com>

Signed-off-by: Tim van der Lippe <tvanderlippe@gmail.com>
2025-05-03 08:47:40 +00:00

22 lines
807 B
INI
Vendored

[to-javascript-parent-initiated-parent-csp.html]
expected: TIMEOUT
[Should not have executed the javascript url for\n iframe.contentWindow.location.href]
expected: TIMEOUT
[Should not have executed the javascript url for\n otherTab.location.href]
expected: NOTRUN
[Should not have executed the javascript url for\n area[target=iframe\].href]
expected: NOTRUN
[Should not have executed the javascript url for\n area[target=otherTab\].href]
expected: NOTRUN
[Should not have executed the javascript url for\n a[target=otherTab\].href]
expected: NOTRUN
[Should not have executed the javascript url for\n a[target=iframe\].href]
expected: NOTRUN
[Should not have executed the javascript url for\n iframe.src]
expected: NOTRUN