summaryrefslogtreecommitdiffstats
path: root/dom/security/test/csp/file_meta_element.html
blob: 17f19c7c865a914156e5bd5f26b6e503eccebd75 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
<!DOCTYPE HTML>
<html>
<head>
  <meta charset="utf-8">
  <meta http-equiv="Content-Security-Policy"
        content= "img-src 'none'; script-src 'unsafe-inline'; report-uri http://www.example.com; frame-ancestors https:; sandbox allow-scripts">
  <title>Bug 663570 - Implement Content Security Policy via meta tag</title>
</head>
<body>

  <!-- try to load an image which is forbidden by meta CSP -->
  <img id="testimage"></img>

  <script type="application/javascript">
    var myImg = document.getElementById("testimage");
    myImg.onload = function(e) {
      window.parent.postMessage({result: "img-loaded"}, "*");
    };
    myImg.onerror = function(e) {
      window.parent.postMessage({result: "img-blocked"}, "*");
    };
    //Image should be tried to load only after onload/onerror event declaration.
    myImg.src = "http://mochi.test:8888/tests/image/test/mochitest/blue.png";
  </script>

</body>
</html>