1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
|
<!DOCTYPE HTML>
<html>
<head>
<meta charset="utf-8">
<title>Bug 1255240 - Test content policy types within content policies for targeted links in iframes</title>
<!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
<script type="text/javascript" src="/tests/SimpleTest/SimpleTest.js"></script>
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
</head>
<body>
<iframe style="width:100%;" id="testframe"></iframe>
<script class="testbody" type="text/javascript">
/* Description of the test:
* Let's load a link into a targeted iframe and make sure the content policy
* type used for content policy checks is of TYPE_SUBDOCUMENT.
*/
const Cc = SpecialPowers.Cc;
const Ci = SpecialPowers.Ci;
const EXPECTED_CONTENT_TYPE = Ci.nsIContentPolicy.TYPE_SUBDOCUMENT;
const EXPECTED_URL =
"http://mochi.test:8888/tests/dom/security/test/general/file_contentpolicytype_targeted_link_iframe.sjs?innerframe";
const TEST_FRAME_URL =
"file_contentpolicytype_targeted_link_iframe.sjs?testframe";
// ----- START Content Policy implementation for the test
var categoryManager = Cc["@mozilla.org/categorymanager;1"].getService(Ci.nsICategoryManager);
const POLICYNAME = "@mozilla.org/iframetestpolicy;1";
const POLICYID = SpecialPowers.wrap(SpecialPowers.Components)
.ID("{6cc95ef3-40e1-4d59-87f0-86f100373227}");
var policy = {
// nsISupports implementation
QueryInterface: function(iid) {
iid = SpecialPowers.wrap(iid);
if (iid.equals(Ci.nsISupports) ||
iid.equals(Ci.nsIFactory) ||
iid.equals(Ci.nsIContentPolicy))
return this;
throw SpecialPowers.Cr.NS_ERROR_NO_INTERFACE;
},
// nsIFactory implementation
createInstance: function(outer, iid) {
return this.QueryInterface(iid);
},
// nsIContentPolicy implementation
shouldLoad: function(contentType, contentLocation, requestOrigin,
context, mimeTypeGuess, extra) {
// make sure we get the right amount of content policy calls
// e.g. about:blank also gets chrcked by content policies
if (contentLocation.asciiSpec === EXPECTED_URL) {
is(contentType, EXPECTED_CONTENT_TYPE,
"content policy type should TYPESUBDOCUMENT");
categoryManager.deleteCategoryEntry("content-policy", POLICYNAME, false);
SimpleTest.finish();
return Ci.nsIContentPolicy.REJECT_REQUEST;
}
return Ci.nsIContentPolicy.ACCEPT;
},
shouldProcess: function(contentType, contentLocation, requestOrigin,
context, mimeTypeGuess, extra) {
return Ci.nsIContentPolicy.ACCEPT;
}
}
policy = SpecialPowers.wrapCallbackObject(policy);
// Register content policy
var componentManager = SpecialPowers.wrap(SpecialPowers.Components).manager
.QueryInterface(Ci.nsIComponentRegistrar);
componentManager.registerFactory(POLICYID, "Test content policy", POLICYNAME, policy);
categoryManager.addCategoryEntry("content-policy", POLICYNAME, POLICYNAME, false, true);
// ----- END Content Policy implementation for the test
// start the test
SimpleTest.waitForExplicitFinish();
var testframe = document.getElementById("testframe");
testframe.src = TEST_FRAME_URL;
</script>
</body>
</html>
|