OLD | NEW |
(Empty) | |
| 1 <!DOCTYPE HTML> |
| 2 <html> |
| 3 |
| 4 <head> |
| 5 <title>Scripts injected via `new Function()` are allowed with `strict-dynami
c` with `unsafe-eval`.</title> |
| 6 <script src='/resources/testharness.js' nonce='dummy'></script> |
| 7 <script src='/resources/testharnessreport.js' nonce='dummy'></script> |
| 8 |
| 9 <!-- CSP served: script-src 'strict-dynamic' 'nonce-dummy' 'unsafe-eval' --> |
| 10 </head> |
| 11 |
| 12 <body> |
| 13 <h1>Scripts injected via `new Function()` are allowed with `strict-dynamic`
with `unsafe-eval`.</h1> |
| 14 <div id='log'></div> |
| 15 |
| 16 <script nonce='dummy'> |
| 17 var newFunctionScriptRan = false; |
| 18 async_test(function(t) { |
| 19 window.addEventListener('securitypolicyviolation', t.unreached_func(
'No CSP violation report has fired.')); |
| 20 try { |
| 21 new Function('newFunctionScriptRan = true;')(); |
| 22 } catch (e) { |
| 23 assert_unreached("`new Function()` should be allowed with `stric
t-dynamic` with `unsafe-eval`."); |
| 24 } |
| 25 assert_true(newFunctionScriptRan); |
| 26 t.done(); |
| 27 }, "Script injected via `new Function()` is allowed with `strict-dynamic
` with `unsafe-eval`."); |
| 28 </script> |
| 29 </body> |
| 30 |
| 31 </html> |
OLD | NEW |