| Index: third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html
 | 
| diff --git a/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html
 | 
| new file mode 100644
 | 
| index 0000000000000000000000000000000000000000..19d2ae1acc7a0c0323c5bba51e16e06dea576427
 | 
| --- /dev/null
 | 
| +++ b/third_party/WebKit/LayoutTests/external/wpt/content-security-policy/script-src/script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html
 | 
| @@ -0,0 +1,29 @@
 | 
| +<!DOCTYPE HTML>
 | 
| +<html>
 | 
| +
 | 
| +<head>
 | 
| +    <title>Scripts without a correct nonce should not run with `strict-dynamic` in the script-src directive.</title>
 | 
| +    <script src='/resources/testharness.js' nonce='dummy'></script>
 | 
| +    <script src='/resources/testharnessreport.js' nonce='dummy'></script>
 | 
| +
 | 
| +    <!-- CSP served: script-src 'strict-dynamic' 'nonce-dummy' -->
 | 
| +</head>
 | 
| +
 | 
| +<body>
 | 
| +    <h1>Scripts without a correct nonce should not run with `strict-dynamic` in the script-src directive.</h1>
 | 
| +    <div id='log'></div>
 | 
| +
 | 
| +    <script nonce='dummy'>
 | 
| +        async_test(function(t) {
 | 
| +            window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
 | 
| +                assert_equals(e.effectiveDirective, 'script-src');
 | 
| +            }));
 | 
| +        }, 'All the expected CSP violation reports have been fired.');
 | 
| +    </script>
 | 
| +
 | 
| +    <script nonce='wrong'>
 | 
| +        assert_unreached('Inline script with an incorrect nonce should not be executed.');
 | 
| +    </script>
 | 
| +</body>
 | 
| +
 | 
| +</html>
 | 
| 
 |