Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_double_policy_honor_whitelist.sub.html |
diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_double_policy_honor_whitelist.sub.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_double_policy_honor_whitelist.sub.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..94490de1b465cfa683ee560147c4f80426d8bec4 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_double_policy_honor_whitelist.sub.html |
@@ -0,0 +1,61 @@ |
+<!DOCTYPE HTML> |
+<html> |
+ |
+<head> |
+ <title>Whitelists in a separate policy are honored with `strict-dynamic` in the script-src directive.</title> |
+ <script src='/resources/testharness.js' nonce='dummy'></script> |
+ <script src='/resources/testharnessreport.js' nonce='dummy'></script> |
+ |
+ <!-- CSP served: |
+ 1) Content-Security-Policy: script-src 'strict-dynamic' 'nonce-dummy' |
+ 2) Content-Security-Policy: script-src 'self' 'nonce-dummy' |
+ --> |
+</head> |
+ |
+<body> |
+ <h1>Whitelists in a separate policy are honored with `strict-dynamic` in the script-src directive.</h1> |
+ <div id='log'></div> |
+ |
+ <script nonce='dummy'> |
+ async_test(function(t) { |
+ window.addEventListener('message', t.step_func(function(e) { |
+ if (e.data === 'whitelisted-appendChild') { |
+ t.done(); |
+ } |
+ })); |
+ window.addEventListener('securitypolicyviolation', t.step_func(function(violation) { |
+ if (violation.blockedURI.split('?')[1] !== 'whitelisted-appendChild') { |
+ return; |
+ } |
+ assert_unreached('Script injected via `appendChild` is allowed with `strict-dynamic` + a nonce+whitelist double policy.'); |
+ })); |
+ |
+ var e = document.createElement('script'); |
+ e.id = 'whitelisted-appendChild'; |
+ e.src = 'simpleSourcedScript.js?' + e.id; |
+ e.onerror = t.unreached_func('Error should not be triggered.'); |
+ document.body.appendChild(e); |
+ }, 'Script injected via `appendChild` is allowed with `strict-dynamic` + a nonce+whitelist double policy.'); |
+ </script> |
+ |
+ <script nonce='dummy'> |
+ async_test(function(t) { |
+ window.addEventListener('securitypolicyviolation', t.step_func(function(violation) { |
+ if (violation.blockedURI.split('?')[1] !== 'nonWhitelisted-appendChild') { |
+ return; |
+ } |
+ assert_equals(violation.effectiveDirective, 'script-src'); |
+ assert_equals(violation.originalPolicy, "script-src 'self' 'nonce-dummy'"); |
+ t.done(); |
+ })); |
+ |
+ var e = document.createElement('script'); |
+ e.id = 'nonWhitelisted-appendChild'; |
+ e.src = '{{location[scheme]}}://{{domains[www2]}}:{{ports[http][0]}}/nonexisting.js?' + e.id; |
+ e.onload = t.unreached_func('OnLoad should not be triggered.'); |
+ document.body.appendChild(e); |
+ }, 'Non-whitelisted script injected via `appendChild` is not allowed with `strict-dynamic` + a nonce+whitelist double policy.'); |
+ </script> |
+</body> |
+ |
+</html> |