File: postMessage-wasm-module.html

package info (click to toggle)
firefox-esr 140.5.0esr-1~deb13u1
  • links: PTS, VCS
  • area: main
  • in suites: trixie-proposed-updates
  • size: 4,539,036 kB
  • sloc: cpp: 7,381,527; javascript: 6,388,905; ansic: 3,710,087; python: 1,393,776; xml: 628,165; asm: 426,918; java: 184,004; sh: 65,744; makefile: 19,302; objc: 13,059; perl: 12,912; yacc: 4,583; cs: 3,846; pascal: 3,352; lex: 1,720; ruby: 1,226; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (31 lines) | stat: -rw-r--r-- 1,069 bytes parent folder | download | duplicates (18)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
<!DOCTYPE html>
<html>
<head>
    <meta charset="utf-8">
    <title>eval-in-iframe</title>
    <script src="/resources/testharness.js"></script>
    <script src="/resources/testharnessreport.js"></script>
    <script src="/common/utils.js"></script>
</head>
<body>
    <iframe src="/content-security-policy/wasm-unsafe-eval/support/iframe.html">
    </iframe>

    <script>
        async_test(t => {
          self.addEventListener('message', t.step_func_done(({data}) => {
            assert_equals(data.violatedDirective, "script-src");
            assert_equals(data.originalPolicy, "default-src 'unsafe-inline'")
            assert_equals(data.blockedURI, "wasm-eval")
          }));
        }, "Got the expected securitypolicyviolation in the iframe");

        const iframe = document.querySelector('iframe');
        iframe.addEventListener('load', () => {
            let m = new WebAssembly.Module(
                new Uint8Array([0, 0x61, 0x73, 0x6d, 0x1, 0, 0, 0]));
            iframe.contentWindow.postMessage(m);
        });
    </script>
</body>
</html>