<!DOCTYPE HTML> <html> <head> <title>Bug 1299483 - CSP: Implement 'strict-dynamic'</title> <!-- Including SimpleTest.js so we can use waitForExplicitFinish !--> <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script> <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" /> </head> <body> <iframe style="width:100%;" id="testframe"></iframe> <script class="testbody" type="text/javascript"> SimpleTest.waitForExplicitFinish(); SpecialPowers.setBoolPref("security.csp.enableStrictDynamic", true); /* Description of the test: * We loader parser and non parser inserted scripts making sure that * parser inserted scripts are blocked if strict-dynamic is present * and no valid nonce and also making sure that non-parser inserted * scripts are allowed to execute. */ var tests = [ { desc: "(parser inserted script) using doc.write(<script>) should be blocked", result: "blocked", file: "file_strict_dynamic_parser_inserted_doc_write.html", policy: "script-src 'strict-dynamic' 'nonce-foo' http:" }, { desc: "(parser inserted script with valid nonce) using doc.write(<script>) should be allowed", result: "allowed", file: "file_strict_dynamic_parser_inserted_doc_write_correct_nonce.html", policy: "script-src 'strict-dynamic' 'nonce-foo' https:" }, { desc: "(non parser inserted script) using appendChild() should allow external script", result: "allowed", file: "file_strict_dynamic_non_parser_inserted.html", policy: "script-src 'strict-dynamic' 'nonce-foo' https:" }, { desc: "(non parser inserted script) using appendChild() should allow inline script", result: "allowed", file: "file_strict_dynamic_non_parser_inserted_inline.html", policy: "script-src 'strict-dynamic' 'nonce-foo' https:" }, { desc: "strict-dynamic should not invalidate 'unsafe-eval'", result: "allowed", file: "file_strict_dynamic_unsafe_eval.html", policy: "script-src 'strict-dynamic' 'nonce-foo' 'unsafe-eval'" }, ]; var counter = 0; var curTest; function loadNextTest() { if (counter == tests.length) { SimpleTest.finish(); return; } curTest = tests[counter++]; var src = "file_testserver.sjs?file="; // append the file that should be served src += escape("tests/dom/security/test/csp/" + curTest.file) // append the CSP that should be used to serve the file src += "&csp=" + escape(curTest.policy); document.getElementById("testframe").addEventListener("load", test, false); document.getElementById("testframe").src = src; } function test() { try { document.getElementById("testframe").removeEventListener('load', test, false); var testframe = document.getElementById("testframe"); var divcontent = testframe.contentWindow.document.getElementById('testdiv').innerHTML; is(divcontent, curTest.result, curTest.desc); } catch (e) { ok(false, "ERROR: could not access content for test: '" + curTest.desc + "'"); } loadNextTest(); } // start running the tests loadNextTest(); </script> </body> </html>