summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/content-security-policy/wasm-unsafe-eval/postMessage-wasm-module.html
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--testing/web-platform/tests/content-security-policy/wasm-unsafe-eval/postMessage-wasm-module.html31
1 files changed, 31 insertions, 0 deletions
diff --git a/testing/web-platform/tests/content-security-policy/wasm-unsafe-eval/postMessage-wasm-module.html b/testing/web-platform/tests/content-security-policy/wasm-unsafe-eval/postMessage-wasm-module.html
new file mode 100644
index 0000000000..9d5e1e0ff3
--- /dev/null
+++ b/testing/web-platform/tests/content-security-policy/wasm-unsafe-eval/postMessage-wasm-module.html
@@ -0,0 +1,31 @@
+<!DOCTYPE html>
+<html>
+<head>
+ <meta charset="utf-8">
+ <title>eval-in-iframe</title>
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+ <script src="/common/utils.js"></script>
+</head>
+<body>
+ <iframe src="/content-security-policy/wasm-unsafe-eval/support/iframe.html">
+ </iframe>
+
+ <script>
+ async_test(t => {
+ self.addEventListener('message', t.step_func_done(({data}) => {
+ assert_equals(data.violatedDirective, "script-src");
+ assert_equals(data.originalPolicy, "default-src 'unsafe-inline'")
+ assert_equals(data.blockedURI, "wasm-eval")
+ }));
+ }, "Got the expected securitypolicyviolation in the iframe");
+
+ const iframe = document.querySelector('iframe');
+ iframe.addEventListener('load', () => {
+ let m = new WebAssembly.Module(
+ new Uint8Array([0, 0x61, 0x73, 0x6d, 0x1, 0, 0, 0]));
+ iframe.contentWindow.postMessage(m);
+ });
+ </script>
+</body>
+</html>