summaryrefslogtreecommitdiffstats
path: root/dom/security/test/csp/test_image_nonce.html
blob: ff6d636b6df1fe855271e8dcca170a0ea8a84bd8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
<!DOCTYPE HTML>
<html>
<head>
  <meta charset="utf-8">
  <title>Bug 1139297 - Implement CSP upgrade-insecure-requests directive</title>
  <!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
  <script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
  <link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
</head>
<body>
<iframe style="width:100%;" id="testframe"></iframe>

<script class="testbody" type="text/javascript">

/* Description of the test:
 * We load three images: (a) with a matching nonce,
                         (b) with a non matching nonce,
 *                       (c) with no nonce
 * and make sure that all three images get blocked because
 * "img-src nonce-bla" should not allow an image load, not
 * even if the nonce matches*.
 */

SimpleTest.waitForExplicitFinish();

var counter = 0;

function finishTest() {
  window.removeEventListener("message", receiveMessage);
  SimpleTest.finish();
}

function checkResults(aResult) {
  counter++;
  if (aResult === "img-with-matching-nonce-blocked" ||
      aResult === "img-with_non-matching-nonce-blocked" ||
      aResult === "img-without-nonce-blocked") {
    ok (true, "correct result for: " + aResult);
  }
  else {
    ok(false, "unexpected result: " + aResult + "\n\n");
  }
  if (counter < 3) {
    return;
  }
  finishTest();
}

// a postMessage handler that is used by sandboxed iframes without
// 'allow-same-origin' to bubble up results back to this main page.
window.addEventListener("message", receiveMessage);
function receiveMessage(event) {
  checkResults(event.data.result);
}

document.getElementById("testframe").src = "file_image_nonce.html";

</script>
</body>
</html>