| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html
|
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..19d2ae1acc7a0c0323c5bba51e16e06dea576427
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html
|
| @@ -0,0 +1,29 @@
|
| +<!DOCTYPE HTML>
|
| +<html>
|
| +
|
| +<head>
|
| + <title>Scripts without a correct nonce should not run with `strict-dynamic` in the script-src directive.</title>
|
| + <script src='/resources/testharness.js' nonce='dummy'></script>
|
| + <script src='/resources/testharnessreport.js' nonce='dummy'></script>
|
| +
|
| + <!-- CSP served: script-src 'strict-dynamic' 'nonce-dummy' -->
|
| +</head>
|
| +
|
| +<body>
|
| + <h1>Scripts without a correct nonce should not run with `strict-dynamic` in the script-src directive.</h1>
|
| + <div id='log'></div>
|
| +
|
| + <script nonce='dummy'>
|
| + async_test(function(t) {
|
| + window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
|
| + assert_equals(e.effectiveDirective, 'script-src');
|
| + }));
|
| + }, 'All the expected CSP violation reports have been fired.');
|
| + </script>
|
| +
|
| + <script nonce='wrong'>
|
| + assert_unreached('Inline script with an incorrect nonce should not be executed.');
|
| + </script>
|
| +</body>
|
| +
|
| +</html>
|
|
|