Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_4.html |
diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_4.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_4.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..5293183d300761b948fd4fedac39c2ddd1312439 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_4.html |
@@ -0,0 +1,25 @@ |
+<!DOCTYPE HTML> |
+<html> |
+<head> |
+ <title>eval() should not run without 'unsafe-eval' script-src directive.</title> |
+ <script src='/resources/testharness.js'></script> |
+ <script src='/resources/testharnessreport.js'></script> |
+</head> |
+<body> |
+ <h1>eval() should not run without 'unsafe-eval' script-src directive.</h1> |
+ <div id='log'></div> |
+ |
+ <script> |
+ |
+ var evalRan = false; |
+ |
+ test(function() {assert_throws(new EvalError(), function() { eval('evalRan = true;') })}, "eval() should throw without 'unsafe-eval' keyword source in script-src directive."); |
+ |
+ test(function() {assert_false(evalRan);}) |
+ |
+ </script> |
+ |
+ <script async defer src='../support/checkReport.sub.js?reportField=violated-directive&reportValue=script-src%20%27self%27+%27unsafe-inline%27'></script> |
+ |
+</body> |
+</html> |