| <!DOCTYPE html> |
| <!-- |
| | This test was modified to not use the HTML4 intrinsic events 'img onload=' or |
| | 'img=onerror'. |
| --> |
| <html> |
| |
| <head> |
| <!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.--> |
| <title>report-disallowed-from-meta</title> |
| <script src="/resources/testharness.js"></script> |
| <script src="/resources/testharnessreport.js"></script> |
| <script src="../support/logTest.sub.js?logs=[]"></script> |
| <script src='../support/alertAssert.sub.js?alerts=["PASS"]'></script> |
| <!-- enforcing policy: |
| img-src 'none'; script-src 'self' 'unsafe-inline'; connect-src 'self'; |
| --> |
| <meta http-equiv="Content-Security-Policy" content="img-src 'none'; report-uri /content-security-policy/support/report.py?op=put&reportID=5ada7c32-1c46-4b79-a95f-af33fcf95f8e"> |
| </head> |
| |
| <body> |
| This image should be blocked, but should not show up in the violation report because meta policies MUST ignore report-uri. |
| <div id='t1'></div> |
| <script> |
| var t1img = document.createElement('img'); |
| t1img.onerror = function() { alert_assert('PASS'); } |
| t1img.onload = function() { alert_assert('FAIL'); } |
| t1img.src = '../resources/abe.png'; |
| var t1div = document.getElementById('t1'); |
| t1div.appendChild(t1img); |
| </script> |
| <div id="log"></div> |
| <script async defer src="../support/checkReport.sub.js?reportExists=false"></script> |
| </body> |
| |
| </html> |