Bug 1698467 [wpt PR 27961] - CSP: Enhance WPTs to check inline and eval blockedURIs...
commit828d2927cbca270080d566c62a708b4ae19e3d13
authorAntonio Sartori <antoniosartori@chromium.org>
Wed, 17 Mar 2021 13:31:42 +0000 (17 13:31 +0000)
committermoz-wptsync-bot <wptsync@mozilla.com>
Fri, 19 Mar 2021 10:35:21 +0000 (19 10:35 +0000)
treee24677304d8021ec5353cf558c37fab0936bb875
parentc5bc8ed92fbafe4b80896d96b510eb628c8fcc46
Bug 1698467 [wpt PR 27961] - CSP: Enhance WPTs to check inline and eval blockedURIs, a=testonly

Automatic update from web-platform-tests
CSP: Enhance WPTs to check inline and eval blockedURIs

This adds a few assertions to Web Platform Tests for Content Security
Policies checking if inline script execution and eval are allowed, so
that they also ensure that the blockedURI in the CSP violation matches
'inline' or 'eval'.

Bug: 563976
Change-Id: Ie2b93fe838768703e652dcfd5bd25b1334abcf57
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2743762
Auto-Submit: Antonio Sartori <antoniosartori@chromium.org>
Reviewed-by: Arthur Sonzogni <arthursonzogni@chromium.org>
Commit-Queue: Antonio Sartori <antoniosartori@chromium.org>
Cr-Commit-Position: refs/heads/master@{#862765}

--

wpt-commits: accfb3c80f500136eafb2969a821845299883ca1
wpt-pr: 27961
testing/web-platform/tests/content-security-policy/script-src/eval-allowed-in-report-only-mode-and-sends-report.html
testing/web-platform/tests/content-security-policy/script-src/eval-allowed-in-report-only-mode-and-sends-report.html.sub.headers
testing/web-platform/tests/content-security-policy/script-src/injected-inline-script-blocked.sub.html
testing/web-platform/tests/content-security-policy/script-src/script-src-strict_dynamic_eval.html