| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html
|
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..137a16421db011557cd60bc37ba209b3141e6339
|
| --- /dev/null
|
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html
|
| @@ -0,0 +1,27 @@
|
| +<!DOCTYPE HTML>
|
| +<html>
|
| +<head>
|
| + <title>data: as script src should not run with a policy that doesn't specify data: as an allowed source</title>
|
| + <script src='/resources/testharness.js'></script>
|
| + <script src='/resources/testharnessreport.js'></script>
|
| +</head>
|
| +<body>
|
| + <h1>data: as script src should not run with a policy that doesn't specify data: as an allowed source</h1>
|
| + <div id='log'></div>
|
| +
|
| + <script>
|
| + var dataScriptRan = false;
|
| + </script>
|
| +
|
| + <!-- This is our test case, but we don't expect it to actually execute if CSP is working. -->
|
| + <script src="data:text/javascript;charset=utf-8;base64,ZGF0YVNjcmlwdFJhbiA9IHRydWU7"></script>
|
| +
|
| + <script>
|
| + test(function () {
|
| + assert_false(dataScriptRan, "data script ran");
|
| + }, "Verify that data: as script src doesn't run with this policy");
|
| + </script>
|
| +
|
| + <script async defer src='../support/checkReport.sub.js?reportField=violated-directive&reportValue=default-src%20%27self%27+%27unsafe-inline%27'></script>
|
| +</body>
|
| +</html>
|
|
|