1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115
|
<!DOCTYPE HTML>
<html>
<head>
<title>Bug 808292 - Implement path-level host-source matching to CSP</title>
<!-- Including SimpleTest.js so we can use waitForExplicitFinish !-->
<script src="/tests/SimpleTest/SimpleTest.js"></script>
<link rel="stylesheet" type="text/css" href="/tests/SimpleTest/test.css" />
</head>
<body>
<p id="display"></p>
<div id="content" style="visibility: hidden">
<iframe style="width:100%;" id="testframe"></iframe>
</div>
<script class="testbody" type="text/javascript">
SimpleTest.waitForExplicitFinish();
/* Description of the test:
* We are loading the following url (including a fragment portion):
* http://test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo
* using different policies and verify that the applied policy is accurately enforced.
*/
var policies = [
["allowed", "*"],
["allowed", "http://*"], // test for bug 1075230, enforcing scheme and wildcard
["allowed", "test1.example.com"],
["allowed", "test1.example.com/"],
["allowed", "test1.example.com/tests/dom/security/test/csp/"],
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js"],
["allowed", "test1.example.com?foo=val"],
["allowed", "test1.example.com/?foo=val"],
["allowed", "test1.example.com/tests/dom/security/test/csp/?foo=val"],
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js?foo=val"],
["allowed", "test1.example.com#foo"],
["allowed", "test1.example.com/#foo"],
["allowed", "test1.example.com/tests/dom/security/test/csp/#foo"],
["allowed", "test1.example.com/tests/dom/security/test/csp/file_path_matching.js#foo"],
["allowed", "*.example.com"],
["allowed", "*.example.com/"],
["allowed", "*.example.com/tests/dom/security/test/csp/"],
["allowed", "*.example.com/tests/dom/security/test/csp/file_path_matching.js"],
["allowed", "test1.example.com:80"],
["allowed", "test1.example.com:80/"],
["allowed", "test1.example.com:80/tests/dom/security/test/csp/"],
["allowed", "test1.example.com:80/tests/dom/security/test/csp/file_path_matching.js"],
["allowed", "test1.example.com:*"],
["allowed", "test1.example.com:*/"],
["allowed", "test1.example.com:*/tests/dom/security/test/csp/"],
["allowed", "test1.example.com:*/tests/dom/security/test/csp/file_path_matching.js"],
["blocked", "test1.example.com/tests"],
["blocked", "test1.example.com/tests/dom/security/test/csp"],
["blocked", "test1.example.com/tests/dom/security/test/csp/file_path_matching.py"],
["blocked", "test1.example.com:8888/tests"],
["blocked", "test1.example.com:8888/tests/dom/security/test/csp"],
["blocked", "test1.example.com:8888/tests/dom/security/test/csp/file_path_matching.py"],
// case insensitive matching for scheme and host, but case sensitive matching for paths
["allowed", "HTTP://test1.EXAMPLE.com/tests/"],
["allowed", "test1.EXAMPLE.com/tests/"],
["blocked", "test1.example.com/tests/dom/security/test/CSP/?foo=val"],
["blocked", "test1.example.com/tests/dom/security/test/csp/FILE_path_matching.js?foo=val"],
]
var counter = 0;
var policy;
function loadNextTest() {
if (counter == policies.length) {
SimpleTest.finish();
}
else {
policy = policies[counter++];
var src = "file_testserver.sjs?file=";
// append the file that should be served
src += (counter % 2 == 0)
// load url including ref: example.com#foo
? escape("tests/dom/security/test/csp/file_path_matching.html")
// load url including query: example.com?val=foo (bug 1147026)
: escape("tests/dom/security/test/csp/file_path_matching_incl_query.html");
// append the CSP that should be used to serve the file
src += "&csp=" + escape("default-src 'none'; script-src " + policy[1]);
document.getElementById("testframe").addEventListener("load", test);
document.getElementById("testframe").src = src;
}
}
function test() {
try {
document.getElementById("testframe").removeEventListener('load', test);
var testframe = document.getElementById("testframe");
var divcontent = testframe.contentWindow.document.getElementById('testdiv').innerHTML;
is(divcontent, policy[0], "should be " + policy[0] + " in test " + (counter - 1) + "!");
}
catch (e) {
ok(false, "ERROR: could not access content in test " + (counter - 1) + "!");
}
loadNextTest();
}
loadNextTest();
</script>
</body>
</html>
|