1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
|
<!DOCTYPE HTML>
<html>
<head>
<title>Bug 1299483 - CSP: Implement 'strict-dynamic'</title>
<!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
<script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
</head>
<body>
<iframe style="width:100%;" id="testframe"></iframe>
<script class="testbody" type="text/javascript">
SimpleTest.waitForExplicitFinish();
SpecialPowers.setBoolPref("security.csp.enableStrictDynamic", true);
/* Description of the test:
* We loader parser and non parser inserted scripts making sure that
* parser inserted scripts are blocked if strict-dynamic is present
* and no valid nonce and also making sure that non-parser inserted
* scripts are allowed to execute.
*/
var tests = [
{
desc: "(parser inserted script) using doc.write(<script>) should be blocked",
result: "blocked",
file: "file_strict_dynamic_parser_inserted_doc_write.html",
policy: "script-src 'strict-dynamic' 'nonce-foo' http:"
},
{
desc: "(parser inserted script with valid nonce) using doc.write(<script>) should be allowed",
result: "allowed",
file: "file_strict_dynamic_parser_inserted_doc_write_correct_nonce.html",
policy: "script-src 'strict-dynamic' 'nonce-foo' https:"
},
{
desc: "(non parser inserted script) using appendChild() should allow external script",
result: "allowed",
file: "file_strict_dynamic_non_parser_inserted.html",
policy: "script-src 'strict-dynamic' 'nonce-foo' https:"
},
{
desc: "(non parser inserted script) using appendChild() should allow inline script",
result: "allowed",
file: "file_strict_dynamic_non_parser_inserted_inline.html",
policy: "script-src 'strict-dynamic' 'nonce-foo' https:"
},
{
desc: "strict-dynamic should not invalidate 'unsafe-eval'",
result: "allowed",
file: "file_strict_dynamic_unsafe_eval.html",
policy: "script-src 'strict-dynamic' 'nonce-foo' 'unsafe-eval'"
},
];
var counter = 0;
var curTest;
function loadNextTest() {
if (counter == tests.length) {
SimpleTest.finish();
return;
}
curTest = tests[counter++];
var src = "file_testserver.sjs?file=";
// append the file that should be served
src += escape("tests/dom/security/test/csp/" + curTest.file)
// append the CSP that should be used to serve the file
src += "&csp=" + escape(curTest.policy);
document.getElementById("testframe").addEventListener("load", test, false);
document.getElementById("testframe").src = src;
}
function test() {
try {
document.getElementById("testframe").removeEventListener('load', test, false);
var testframe = document.getElementById("testframe");
var divcontent = testframe.contentWindow.document.getElementById('testdiv').innerHTML;
is(divcontent, curTest.result, curTest.desc);
}
catch (e) {
ok(false, "ERROR: could not access content for test: '" + curTest.desc + "'");
}
loadNextTest();
}
// start running the tests
loadNextTest();
</script>
</body>
</html>
|