File: report-only-unsafe-eval.html

package info (click to toggle)
firefox 143.0.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,617,328 kB
  • sloc: cpp: 7,478,492; javascript: 6,417,157; ansic: 3,720,058; python: 1,396,372; xml: 627,523; asm: 438,677; java: 186,156; sh: 63,477; makefile: 19,171; objc: 13,059; perl: 12,983; yacc: 4,583; cs: 3,846; pascal: 3,405; lex: 1,720; ruby: 1,003; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 53; csh: 10
file content (31 lines) | stat: -rw-r--r-- 1,267 bytes parent folder | download | duplicates (22)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
<!DOCTYPE html>
<html>
<head>
    <script nonce='abc' src="/resources/testharness.js"></script>
    <script nonce='abc' src="/resources/testharnessreport.js"></script>
    <!-- CSP headers
Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'nonce-abc'; report-uri /reporting/resources/report.py?op=put&reportID={{$id}}
-->
</head>
<body>
    <script nonce='abc'>
      var t = async_test("Eval is allowed because the CSP is report-only");

      var t_spv = async_test("SPV event is still raised");
      t_spv.step_timeout(t_spv.unreached_func("SPV event has not been received"), 3000);
      document.addEventListener('securitypolicyviolation', t_spv.step_func(e => {
        assert_equals(e.violatedDirective, "script-src");
        assert_equals(e.blockedURI, "eval");
        t_spv.done();
      }));

      try {
        eval("t.done()");
      } catch {
        t.step(t.unreached_func("The eval should have executed succesfully"));
        t_spv.step(t_spv.unreached_func("The eval execution should have triggered a securitypolicyviolation event"));
      }
    </script>
    <script nonce='abc' async defer src='../support/checkReport.sub.js?reportField=violated-directive&reportValue=script-src%20%27unsafe-inline%27'></script>
</body>
</html>