forked from mirrors/gecko-dev
		
	
		
			
				
	
	
		
			95 lines
		
	
	
	
		
			3 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
			
		
		
	
	
			95 lines
		
	
	
	
		
			3 KiB
		
	
	
	
		
			HTML
		
	
	
	
	
	
| <!DOCTYPE HTML>
 | |
| <html>
 | |
| <head>
 | |
|   <title>Bug 1299483 - CSP: Implement 'strict-dynamic'</title>
 | |
|   <!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
 | |
|   <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
 | |
|   <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
 | |
| </head>
 | |
| <body>
 | |
|   <iframe style="width:100%;" id="testframe"></iframe>
 | |
| 
 | |
| <script class="testbody" type="text/javascript">
 | |
| 
 | |
| SimpleTest.waitForExplicitFinish();
 | |
| SpecialPowers.setBoolPref("security.csp.enableStrictDynamic", true);
 | |
| 
 | |
| /* Description of the test:
 | |
|  * We loader parser and non parser inserted scripts making sure that
 | |
|  * parser inserted scripts are blocked if strict-dynamic is present
 | |
|  * and no valid nonce and also making sure that non-parser inserted
 | |
|  * scripts are allowed to execute.
 | |
|  */
 | |
| 
 | |
| var tests = [
 | |
|   {
 | |
|     desc: "(parser inserted script) using doc.write(<script>) should be blocked",
 | |
|     result: "blocked",
 | |
|     file: "file_strict_dynamic_parser_inserted_doc_write.html",
 | |
|     policy: "script-src 'strict-dynamic' 'nonce-foo' http:"
 | |
|   },
 | |
|   {
 | |
|     desc: "(parser inserted script with valid nonce) using doc.write(<script>) should be allowed",
 | |
|     result: "allowed",
 | |
|     file: "file_strict_dynamic_parser_inserted_doc_write_correct_nonce.html",
 | |
|     policy: "script-src 'strict-dynamic' 'nonce-foo' https:"
 | |
|   },
 | |
|   {
 | |
|     desc: "(non parser inserted script) using appendChild() should allow external script",
 | |
|     result: "allowed",
 | |
|     file: "file_strict_dynamic_non_parser_inserted.html",
 | |
|     policy: "script-src 'strict-dynamic' 'nonce-foo' https:"
 | |
|   },
 | |
|   {
 | |
|      desc: "(non parser inserted script) using appendChild() should allow inline script",
 | |
|      result: "allowed",
 | |
|      file: "file_strict_dynamic_non_parser_inserted_inline.html",
 | |
|      policy: "script-src 'strict-dynamic' 'nonce-foo' https:"
 | |
|   },
 | |
|   {
 | |
|      desc: "strict-dynamic should not invalidate 'unsafe-eval'",
 | |
|      result: "allowed",
 | |
|      file: "file_strict_dynamic_unsafe_eval.html",
 | |
|      policy: "script-src 'strict-dynamic' 'nonce-foo' 'unsafe-eval'"
 | |
|    },
 | |
| ];
 | |
| 
 | |
| var counter = 0;
 | |
| var curTest;
 | |
| 
 | |
| function loadNextTest() {
 | |
|   if (counter == tests.length) {
 | |
|     SimpleTest.finish();
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   curTest = tests[counter++];
 | |
|   var src = "file_testserver.sjs?file=";
 | |
|   // append the file that should be served
 | |
|   src += escape("tests/dom/security/test/csp/" + curTest.file)
 | |
|   // append the CSP that should be used to serve the file
 | |
|   src += "&csp=" + escape(curTest.policy);
 | |
| 
 | |
|   document.getElementById("testframe").addEventListener("load", test);
 | |
|   document.getElementById("testframe").src = src;
 | |
| }
 | |
| 
 | |
| function test() {
 | |
|   try {
 | |
|     document.getElementById("testframe").removeEventListener('load', test);
 | |
|     var testframe = document.getElementById("testframe");
 | |
|     var divcontent = testframe.contentWindow.document.getElementById('testdiv').innerHTML;
 | |
|     is(divcontent, curTest.result, curTest.desc);
 | |
|   }
 | |
|   catch (e) {
 | |
|     ok(false, "ERROR: could not access content for test: '" + curTest.desc + "'");
 | |
|   }
 | |
|   loadNextTest();
 | |
| }
 | |
| 
 | |
| // start running the tests
 | |
| loadNextTest();
 | |
| 
 | |
| </script>
 | |
| </body>
 | |
| </html>
 | 
