File: postMessage-wasm-module.html

package info (click to toggle)
firefox-esr 115.15.0esr-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 3,659,216 kB
  • sloc: cpp: 6,676,686; javascript: 5,690,965; ansic: 3,328,546; python: 1,120,594; asm: 397,163; xml: 180,531; java: 178,838; sh: 68,930; makefile: 20,999; perl: 12,595; objc: 12,561; yacc: 4,583; cs: 3,846; pascal: 2,840; lex: 1,720; ruby: 1,079; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (31 lines) | stat: -rw-r--r-- 1,069 bytes parent folder | download | duplicates (18)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
<!DOCTYPE html>
<html>
<head>
    <meta charset="utf-8">
    <title>eval-in-iframe</title>
    <script src="/resources/testharness.js"></script>
    <script src="/resources/testharnessreport.js"></script>
    <script src="/common/utils.js"></script>
</head>
<body>
    <iframe src="/content-security-policy/wasm-unsafe-eval/support/iframe.html">
    </iframe>

    <script>
        async_test(t => {
          self.addEventListener('message', t.step_func_done(({data}) => {
            assert_equals(data.violatedDirective, "script-src");
            assert_equals(data.originalPolicy, "default-src 'unsafe-inline'")
            assert_equals(data.blockedURI, "wasm-eval")
          }));
        }, "Got the expected securitypolicyviolation in the iframe");

        const iframe = document.querySelector('iframe');
        iframe.addEventListener('load', () => {
            let m = new WebAssembly.Module(
                new Uint8Array([0, 0x61, 0x73, 0x6d, 0x1, 0, 0, 0]));
            iframe.contentWindow.postMessage(m);
        });
    </script>
</body>
</html>