summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/wasm/webapi/esm-integration/script-src-blocks-wasm.tentative.html
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/wasm/webapi/esm-integration/script-src-blocks-wasm.tentative.html')
-rw-r--r--testing/web-platform/tests/wasm/webapi/esm-integration/script-src-blocks-wasm.tentative.html21
1 files changed, 21 insertions, 0 deletions
diff --git a/testing/web-platform/tests/wasm/webapi/esm-integration/script-src-blocks-wasm.tentative.html b/testing/web-platform/tests/wasm/webapi/esm-integration/script-src-blocks-wasm.tentative.html
new file mode 100644
index 0000000000..c1232730ea
--- /dev/null
+++ b/testing/web-platform/tests/wasm/webapi/esm-integration/script-src-blocks-wasm.tentative.html
@@ -0,0 +1,21 @@
+<!DOCTYPE html>
+<title>script-src blocks Wasm execution</title>
+<meta http-equiv="Content-Security-Policy" content="script-src 'unsafe-inline';">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script>
+ setup({allow_uncaught_exception: true});
+
+ const test_load = async_test(
+ "Importing a WebAssembly module should be guarded by script-src CSP.");
+
+ window.log = [];
+ document.addEventListener("securitypolicyviolation", (e) => {
+ window.log.push(e.violatedDirective);
+ });
+
+ window.addEventListener("load", test_load.step_func_done(ev => {
+ assert_array_equals(log, ["script-src-elem"]);
+ }));
+</script>
+<script type="module" src="./resources/execute-start.wasm"></script>