summaryrefslogtreecommitdiffstats
path: root/dom/security/test/csp/file_sandbox_12.html
blob: 8bed9dc598e48c7b64603aa790c1206b92045928 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
<!DOCTYPE HTML>
<html>
<head>
  <meta charset="utf-8">
  <script type="text/javascript" src="/tests/SimpleTest/EventUtils.js"></script>
</head>
<script type="text/javascript">
  function ok(result, desc) {
    window.parent.postMessage({ok: result, desc: desc}, "*");
  }

  function doStuff() {
    ok(true, "documents sandboxed with allow-scripts should be able to run inline scripts");

    document.getElementById('a_form').submit();

    // trigger the javascript: url test
    sendMouseEvent({type:'click'}, 'a_link');
  }
</script>
<script src='file_sandbox_pass.js'></script>
<body onLoad='ok(true, "documents sandboxed with allow-scripts should be able to run script from event listeners");doStuff();'>
  I am sandboxed but with "allow-same-origin" and allow-scripts"


  <!-- Content-Security-Policy: sandbox allow-same-origin allow-scripts; default-src 'self' 'unsafe-inline'; -->

  <!-- these should be stopped by CSP -->
  <img src="http://example.org/tests/dom/security/test/csp/file_CSP.sjs?testid=img12_bad&type=img/png"> </img>
  <script src='http://example.org/tests/dom/security/test/csp/file_CSP.sjs?testid=script12_bad&type=text/javascript'></script>

  <form method="get" action="/tests/content/html/content/test/file_iframe_sandbox_form_fail.html" id="a_form">
    First name: <input type="text" name="firstname">
    Last name: <input type="text" name="lastname">
    <input type="submit" onclick="doSubmit()" id="a_button">
  </form>

  <a href = 'javascript:ok(true, "documents sandboxed with allow-scripts should be able to run script from javascript: URLs");' id='a_link'>click me</a>
</body>
</html>