summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/content-security-policy/script-src/script-src-strict_dynamic_new_function.html
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/content-security-policy/script-src/script-src-strict_dynamic_new_function.html')
-rw-r--r--testing/web-platform/tests/content-security-policy/script-src/script-src-strict_dynamic_new_function.html37
1 files changed, 37 insertions, 0 deletions
diff --git a/testing/web-platform/tests/content-security-policy/script-src/script-src-strict_dynamic_new_function.html b/testing/web-platform/tests/content-security-policy/script-src/script-src-strict_dynamic_new_function.html
new file mode 100644
index 0000000000..263d5d1d87
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/script-src/script-src-strict_dynamic_new_function.html
@@ -0,0 +1,37 @@
+<!DOCTYPE HTML>
+<html>
+
+<head>
+ <title>Scripts injected via `new Function()` are not allowed with `strict-dynamic` without `unsafe-eval`.</title>
+ <script src='/resources/testharness.js' nonce='dummy'></script>
+ <script src='/resources/testharnessreport.js' nonce='dummy'></script>
+
+ <!-- CSP served: script-src 'strict-dynamic' 'nonce-dummy' -->
+</head>
+
+<body>
+ <h1>Scripts injected via `new Function()` are not allowed with `strict-dynamic` without `unsafe-eval`.</h1>
+ <div id='log'></div>
+
+ <script nonce='dummy'>
+ var newFunctionScriptRan = false;
+
+ async_test(function(t) {
+ window.addEventListener('securitypolicyviolation', t.step_func_done(function(e) {
+ assert_false(newFunctionScriptRan);
+ assert_equals(e.effectiveDirective, 'script-src');
+ }));
+
+ assert_throws_js(Error,
+ function() {
+ try {
+ new Function('newFunctionScriptRan = true;')();
+ } catch (e) {
+ throw new Error();
+ }
+ });
+ }, "Script injected via 'eval' is not allowed with 'strict-dynamic' without 'unsafe-eval'.");
+ </script>
+</body>
+
+</html> \ No newline at end of file