File: source-phase-blocked-by-csp.tentative.html

package info (click to toggle)
firefox 144.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,637,504 kB
  • sloc: cpp: 7,576,692; javascript: 6,430,831; ansic: 3,748,119; python: 1,398,978; xml: 628,810; asm: 438,679; java: 186,194; sh: 63,212; makefile: 19,159; objc: 13,086; perl: 12,986; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 53; csh: 10
file content (23 lines) | stat: -rw-r--r-- 895 bytes parent folder | download | duplicates (11)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
<!doctype html>
<title>Source phase imports blocked by CSP</title>
<meta http-equiv="Content-Security-Policy" content="script-src 'self' 'unsafe-inline';">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script>
  setup({allow_uncaught_exception: true});

  const test_load = async_test(
      "Importing a WebAssembly module should be guarded by script-src CSP.");

  window.violationCount = 0;
  document.addEventListener("securitypolicyviolation", (e) => {
    test_load.step(() => {
      assert_equals("script-src-elem", e.violatedDirective);
    });
    if (++violationCount == 2) {
      test_load.done();
    }
  });
</script>
<script type=module src="./resources/cross-origin-wasm-static-source-phase-import.sub.js"></script>
<script type=module src="./resources/cross-origin-wasm-dynamic-source-phase-import.sub.js"></script>