Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_2_1.html |
diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_2_1.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_2_1.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..255f5df9ce19ea2885152cf2e69c56377e88ab93 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_2_1.html |
@@ -0,0 +1,23 @@ |
+<!DOCTYPE HTML> |
+<html> |
+<head> |
+ <title>Inline script attached by DOM manipulation should not run without an 'unsafe-inline' script-src policy, even with default-src *</title> |
+ <script src='/resources/testharness.js'></script> |
+ <script src='/resources/testharnessreport.js'></script> |
+</head> |
+<body> |
+ <h1>Inline script attached by DOM manipulation should not run without an 'unsafe-inline' script-src policy, even with default-src *</h1> |
+ <div id="log"></div> |
+ |
+ <div id=attachHere></div> |
+ |
+ <script id=emptyScript></script> |
+ |
+ <div id=emptyDiv></div> |
+ |
+ <script src="addInlineTestsWithDOMManipulation.js"></script> |
+ |
+ <script async defer src="../support/checkReport.sub.js?reportField=violated-directive&reportValue=script-src%20*"></script> |
+ |
+</body> |
+</html> |