Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(7)

Side by Side Diff: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_and_unsafe_eval_new_function.html

Issue 2695813009: Import wpt@503f5b5f78ec4e87d144f78609f363f0ed0ea8db (Closed)
Patch Set: Skip some tests Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 <!DOCTYPE HTML>
2 <html>
3
4 <head>
5 <title>Scripts injected via `new Function()` are allowed with `strict-dynami c` with `unsafe-eval`.</title>
6 <script src='/resources/testharness.js' nonce='dummy'></script>
7 <script src='/resources/testharnessreport.js' nonce='dummy'></script>
8
9 <!-- CSP served: script-src 'strict-dynamic' 'nonce-dummy' 'unsafe-eval' -->
10 </head>
11
12 <body>
13 <h1>Scripts injected via `new Function()` are allowed with `strict-dynamic` with `unsafe-eval`.</h1>
14 <div id='log'></div>
15
16 <script nonce='dummy'>
17 var newFunctionScriptRan = false;
18 async_test(function(t) {
19 window.addEventListener('securitypolicyviolation', t.unreached_func( 'No CSP violation report has fired.'));
20 try {
21 new Function('newFunctionScriptRan = true;')();
22 } catch (e) {
23 assert_unreached("`new Function()` should be allowed with `stric t-dynamic` with `unsafe-eval`.");
24 }
25 assert_true(newFunctionScriptRan);
26 t.done();
27 }, "Script injected via `new Function()` is allowed with `strict-dynamic ` with `unsafe-eval`.");
28 </script>
29 </body>
30
31 </html>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698