| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html
 | 
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html
 | 
| new file mode 100644
 | 
| index 0000000000000000000000000000000000000000..137a16421db011557cd60bc37ba209b3141e6339
 | 
| --- /dev/null
 | 
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-1_10.html
 | 
| @@ -0,0 +1,27 @@
 | 
| +<!DOCTYPE HTML>
 | 
| +<html>
 | 
| +<head>
 | 
| +    <title>data: as script src should not run with a policy that doesn't specify data: as an allowed source</title>
 | 
| +    <script src='/resources/testharness.js'></script>
 | 
| +    <script src='/resources/testharnessreport.js'></script>
 | 
| +</head>
 | 
| +<body>
 | 
| +    <h1>data: as script src should not run with a policy that doesn't specify data: as an allowed source</h1>
 | 
| +    <div id='log'></div>
 | 
| +
 | 
| +    <script>
 | 
| +        var dataScriptRan = false;
 | 
| +    </script>
 | 
| +
 | 
| +    <!-- This is our test case, but we don't expect it to actually execute if CSP is working. -->
 | 
| +    <script src="data:text/javascript;charset=utf-8;base64,ZGF0YVNjcmlwdFJhbiA9IHRydWU7"></script>
 | 
| +
 | 
| +    <script>
 | 
| +        test(function () {
 | 
| +            assert_false(dataScriptRan, "data script ran");
 | 
| +        }, "Verify that data: as script src doesn't run with this policy");
 | 
| +    </script>
 | 
| +
 | 
| +    <script async defer src='../support/checkReport.sub.js?reportField=violated-directive&reportValue=default-src%20%27self%27+%27unsafe-inline%27'></script>
 | 
| +</body>
 | 
| +</html>
 | 
| 
 |