Source code
Revision control
Copy as Markdown
Other Tools
Test Info: Warnings
- This test has a WPT meta file that expects 1 subtest issues.
- This WPT test may be referenced by the following Test IDs:
- /content-security-policy/unsafe-eval/tentative/eval-allowed-by-hash-long-script.sub.html - WPT Dashboard Interop Dashboard
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Security-Policy" content="script-src 'self' 'unsafe-inline' 'eval-sha256-VQy4ev8+SNjwocE4f/UdEfFZK/kEkq7mIM/M/mZrVpE='; connect-src 'self';">
<title>eval-allowed</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="../../support/logTest.sub.js?logs=[]"></script>
<script src='../../support/alertAssert.sub.js?alerts=["PASS, long text that exceeds the 40 character limit used for report snippets"]'></script>
</head>
<body>
<script>
window.addEventListener('securitypolicyviolation', function(e) {
log("Fail");
});
eval("alert_assert('PASS, long text that exceeds the 40 character limit used for report snippets')");
</script>
<div id="log"></div>
</body>
</html>