chromium/third_party/blink/web_tests/http/tests/security/contentSecurityPolicy/source-list-parsing-07.html

<!DOCTYPE html>
<html>
<head>
<script src='resources/multiple-iframe-test.js'></script>
<script>
var tests = [
    ['no', 'script-src http:/', 'resources/script.js'],
    ['no', 'script-src http://', 'resources/script.js'],
    ['no', 'script-src http:/127.0.0.1', 'resources/script.js'],
    ['no', 'script-src http:///127.0.0.1', 'resources/script.js'],
    ['no', 'script-src http://127.0.0.1:/', 'resources/script.js'],
    ['no', 'script-src https://127.?.0.1:*', 'resources/script.js'],
    ['no', 'script-src https://127.0.0.1:', 'resources/script.js'],
    ['no', 'script-src \'slef\'', 'resources/script.js'],
    ['yes','script-src https://127.0.0.1:\t*   ', 'resources/script.js'],
];
</script>
</head>
<body onload="test()">
  <p>
    Invalid source expressions should log a console warning, and be ignored.
  </p>