Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/require-sri-for/require-sri-for-script-reportonly-blocked.php |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/require-sri-for/require-sri-for-script-reportonly-blocked.php b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/require-sri-for/require-sri-for-script-reportonly-blocked.php |
new file mode 100644 |
index 0000000000000000000000000000000000000000..85dbb63da471662e5c004e48afa52850687c2d24 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/require-sri-for/require-sri-for-script-reportonly-blocked.php |
@@ -0,0 +1,25 @@ |
+<!-- <?php |
+ // TODO(mkwst) enable after windows hash differences are fixed |
+ header("Content-Security-Policy-Report-Only: require-sri-for script; script-src 'self' 'unsafe-inline'"); |
+?> --> |
Mike West
2016/07/14 07:29:49
Drop the `<!--/-->`.
|
+<!doctype html> |
+<script src="/resources/testharness.js"></script> |
+<script src="/resources/testharnessreport.js"></script> |
+<script> |
+ // TODO(mkwst) remove .expected after windows hash differences are fixed |
+ async_test(t => { |
+ var watcher = new EventWatcher(t, document, ['securitypolicyviolation']); |
+ watcher |
+ .wait_for('securitypolicyviolation') |
+ .then(t.step_func_done(e => { |
+ assert_equals(e.blockedURI, "http://127.0.0.1:8000/security/contentSecurityPolicy/require-sri-for/ran.js"); |
+ })); |
+ }, "Script without integrity generates reports."); |
Mike West
2016/07/14 07:29:49
I don't think you'll have to change this, actually
Sergey Shekyan
2016/07/14 08:01:33
Indeed, there is almost nothing to change. `testha
|
+ |
+ var executed_test = async_test("Script that requires integrity executes and generates a violation report."); |
+</script> |
+<script src="ran.js"></script> |
+<script> |
+ assert_equals(z, 13); |
+ executed_test.done(); |
+</script> |