blob: 0a84e6e0859bf0787db29070e12ac281c4736f81 [file] [log] [blame]
<!DOCTYPE html>
<html>
<head>
<script>
if (window.testRunner) {
testRunner.dumpAsText();
testRunner.dumpChildFramesAsText();
testRunner.dumpFrameLoadCallbacks();
testRunner.waitUntilDone();
}
</script>
</head>
<body>
<p>This test loads a secure iframe that loads an insecure stylesheet. We should trigger a
mixed content block even though the child frame has a report only CSP block-all-mixed-content
directive because an active network attacker can use CSS3 to breach the confidentiality of
the HTTPS security origin.</p>
<iframe src="https://127.0.0.1:8443/security/contentSecurityPolicy/block-all-mixed-content/resources/frame-with-insecure-css-report-only.py" width="100%" height="300"></iframe>
</body>
</html>