mirror of
https://github.com/classilla/tenfourfox.git
synced 2025-02-06 02:30:56 +00:00
116 lines
4.4 KiB
HTML
116 lines
4.4 KiB
HTML
<!DOCTYPE HTML>
|
|
<html>
|
|
<head>
|
|
<title>Bug 808292 - Implement path-level host-source matching to CSP</title>
|
|
<!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
|
|
<script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
|
|
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
|
|
</head>
|
|
<body>
|
|
<p id="display"></p>
|
|
<div id="content" style="visibility: hidden">
|
|
<iframe style="width:100%;" id="testframe"></iframe>
|
|
</div>
|
|
|
|
<script class="testbody" type="text/javascript">
|
|
|
|
SimpleTest.waitForExplicitFinish();
|
|
|
|
/* Description of the test:
|
|
* We are loading the following url (including a fragment portion):
|
|
* http://test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo
|
|
* using different policies and verify that the applied policy is accurately enforced.
|
|
*/
|
|
|
|
var policies = [
|
|
["allowed", "*"],
|
|
["allowed", "http://*"], // test for bug 1075230, enforcing scheme and wildcard
|
|
["allowed", "test1.example.com"],
|
|
["allowed", "test1.example.com/"],
|
|
["allowed", "test1.example.com/tests/dom/security/test/csp/"],
|
|
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js"],
|
|
|
|
["allowed", "test1.example.com?foo=val"],
|
|
["allowed", "test1.example.com/?foo=val"],
|
|
["allowed", "test1.example.com/tests/dom/security/test/csp/?foo=val"],
|
|
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js?foo=val"],
|
|
|
|
["allowed", "test1.example.com#foo"],
|
|
["allowed", "test1.example.com/#foo"],
|
|
["allowed", "test1.example.com/tests/dom/security/test/csp/#foo"],
|
|
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo"],
|
|
|
|
["allowed", "*.example.com"],
|
|
["allowed", "*.example.com/"],
|
|
["allowed", "*.example.com/tests/dom/security/test/csp/"],
|
|
["allowed", "*.example.com/tests/dom/security/test/csp/file_path_matching.js"],
|
|
|
|
["allowed", "test1.example.com:80"],
|
|
["allowed", "test1.example.com:80/"],
|
|
["allowed", "test1.example.com:80/tests/dom/security/test/csp/"],
|
|
["allowed", "test1.example.com:80/tests/dom/security/test/csp/file_path_matching.js"],
|
|
|
|
["allowed", "test1.example.com:*"],
|
|
["allowed", "test1.example.com:*/"],
|
|
["allowed", "test1.example.com:*/tests/dom/security/test/csp/"],
|
|
["allowed", "test1.example.com:*/tests/dom/security/test/csp/file_path_matching.js"],
|
|
|
|
["blocked", "test1.example.com/tests"],
|
|
["blocked", "test1.example.com/tests/dom/security/test/csp"],
|
|
["blocked", "test1.example.com/tests/dom/security/test/csp/file_path_matching.py"],
|
|
|
|
["blocked", "test1.example.com:8888/tests"],
|
|
["blocked", "test1.example.com:8888/tests/dom/security/test/csp"],
|
|
["blocked", "test1.example.com:8888/tests/dom/security/test/csp/file_path_matching.py"],
|
|
|
|
// case insensitive matching for scheme and host, but case sensitive matching for paths
|
|
["allowed", "HTTP://test1.EXAMPLE.com/tests/"],
|
|
["allowed", "test1.EXAMPLE.com/tests/"],
|
|
["blocked", "test1.example.com/tests/dom/security/test/CSP/?foo=val"],
|
|
["blocked", "test1.example.com/tests/dom/security/test/csp/FILE_path_matching.js?foo=val"],
|
|
]
|
|
|
|
var counter = 0;
|
|
var policy;
|
|
|
|
function loadNextTest() {
|
|
if (counter == policies.length) {
|
|
SimpleTest.finish();
|
|
}
|
|
else {
|
|
policy = policies[counter++];
|
|
var src = "file_testserver.sjs?file=";
|
|
// append the file that should be served
|
|
src += (counter % 2 == 0)
|
|
// load url including ref: example.com#foo
|
|
? escape("tests/dom/security/test/csp/file_path_matching.html")
|
|
// load url including query: example.com?val=foo (bug 1147026)
|
|
: escape("tests/dom/security/test/csp/file_path_matching_incl_query.html");
|
|
|
|
// append the CSP that should be used to serve the file
|
|
src += "&csp=" + escape("default-src 'none'; script-src " + policy[1]);
|
|
|
|
document.getElementById("testframe").addEventListener("load", test, false);
|
|
document.getElementById("testframe").src = src;
|
|
}
|
|
}
|
|
|
|
function test() {
|
|
try {
|
|
document.getElementById("testframe").removeEventListener('load', test, false);
|
|
var testframe = document.getElementById("testframe");
|
|
var divcontent = testframe.contentWindow.document.getElementById('testdiv').innerHTML;
|
|
is(divcontent, policy[0], "should be " + policy[0] + " in test " + (counter - 1) + "!");
|
|
}
|
|
catch (e) {
|
|
ok(false, "ERROR: could not access content in test " + (counter - 1) + "!");
|
|
}
|
|
loadNextTest();
|
|
}
|
|
|
|
loadNextTest();
|
|
|
|
</script>
|
|
</body>
|
|
</html>
|