OLD | NEW |
(Empty) | |
| 1 <!DOCTYPE HTML> |
| 2 <html> |
| 3 |
| 4 <head> |
| 5 <title>Scripts injected via `eval` are allowed with `strict-dynamic` with `u
nsafe-eval`.</title> |
| 6 <script src='/resources/testharness.js' nonce='dummy'></script> |
| 7 <script src='/resources/testharnessreport.js' nonce='dummy'></script> |
| 8 |
| 9 <!-- CSP served: script-src 'strict-dynamic' 'nonce-dummy' 'unsafe-eval' --> |
| 10 </head> |
| 11 |
| 12 <body> |
| 13 <h1>Scripts injected via `eval` are allowed with `strict-dynamic` with `unsa
fe-eval`.</h1> |
| 14 <div id='log'></div> |
| 15 |
| 16 <script nonce='dummy'> |
| 17 var evalScriptRan = false; |
| 18 async_test(function(t) { |
| 19 window.addEventListener('securitypolicyviolation', t.unreached_func(
'No CSP violation report has fired.')); |
| 20 try { |
| 21 eval("evalScriptRan = true;"); |
| 22 } catch (e) { |
| 23 assert_unreached("`eval` should be allowed with `strict-dynamic`
with `unsafe-eval`."); |
| 24 } |
| 25 assert_true(evalScriptRan); |
| 26 t.done(); |
| 27 }, "Script injected via `eval` is allowed with `strict-dynamic` with `un
safe-eval`."); |
| 28 </script> |
| 29 </body> |
| 30 |
| 31 </html> |
OLD | NEW |