Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html |
diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..19d2ae1acc7a0c0323c5bba51e16e06dea576427 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html |
@@ -0,0 +1,29 @@ |
+<!DOCTYPE HTML> |
+<html> |
+ |
+<head> |
+ <title>Scripts without a correct nonce should not run with `strict-dynamic` in the script-src directive.</title> |
+ <script src='/resources/testharness.js' nonce='dummy'></script> |
+ <script src='/resources/testharnessreport.js' nonce='dummy'></script> |
+ |
+ <!-- CSP served: script-src 'strict-dynamic' 'nonce-dummy' --> |
+</head> |
+ |
+<body> |
+ <h1>Scripts without a correct nonce should not run with `strict-dynamic` in the script-src directive.</h1> |
+ <div id='log'></div> |
+ |
+ <script nonce='dummy'> |
+ async_test(function(t) { |
+ window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) { |
+ assert_equals(e.effectiveDirective, 'script-src'); |
+ })); |
+ }, 'All the expected CSP violation reports have been fired.'); |
+ </script> |
+ |
+ <script nonce='wrong'> |
+ assert_unreached('Inline script with an incorrect nonce should not be executed.'); |
+ </script> |
+</body> |
+ |
+</html> |