File: to-javascript-parent-initiated-check-csp-order.html

package info (click to toggle)
firefox-esr 140.5.0esr-1~deb13u1
  • links: PTS, VCS
  • area: main
  • in suites: trixie-proposed-updates
  • size: 4,539,036 kB
  • sloc: cpp: 7,381,527; javascript: 6,388,905; ansic: 3,710,087; python: 1,393,776; xml: 628,165; asm: 426,918; java: 184,004; sh: 65,744; makefile: 19,302; objc: 13,059; perl: 12,912; yacc: 4,583; cs: 3,846; pascal: 3,352; lex: 1,720; ruby: 1,226; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (99 lines) | stat: -rw-r--r-- 3,891 bytes parent folder | download | duplicates (12)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-security-policy" content="script-src 'self' 'nonce-abc'">
<meta charset="utf-8">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="support/utils.js"></script>
</head>
<body>
<iframe id="iframeWithScriptSrcNone"></iframe>
<a id="anchorWithTargetScriptSrcNone" target="iframeWithScriptSrcNone">a</a>
<a id="anchorWithTargetOtherTabWithScriptSrcNone" target="otherTabWithScriptSrcNone">a2</a>
<map name="m">
  <area target="iframeWithScriptScrcNone" id="areaWithTargetIframeWithScriptSrcNone" shape="default">
  <area target="otherTabWithScriptSrcNone" id="areaWithTargetOtherTabWithScriptSrcNone" shape="default">
</map>
<img usemap="#m" alt="i">

<script nonce="abc">
  // Since another tab is opened, this test suite needs to explicitly signal
  // when it's done. Otherwise, the tests which wait for the tab to finish
  // loading aren't executed. See,
  // https://web-platform-tests.org/writing-tests/testharness-api.html#determining-when-all-tests-are-complete.
  setup({explicit_done: true});

  const kEncodedURLOfPageWithScriptSrcNone = encodeURIWithApostrophes(
    "support/frame-with-csp.sub.html" + "?csp=script-src 'none'");

  document.getElementById("iframeWithScriptSrcNone").src =
    kEncodedURLOfPageWithScriptSrcNone;

  window.addEventListener("load", () => {
    const otherTabWithScriptSrcNone = window.open(
      kEncodedURLOfPageWithScriptSrcNone, "otherTabWithScriptSrcNone");

    otherTabWithScriptSrcNone.addEventListener("load", () => {
      const kTestCases = [
        { elementId: "iframeWithScriptSrcNone",
          propertySequence: ["contentWindow", "location", "href"],
        },
        { elementId: "iframeWithScriptSrcNone",
          propertySequence: ["src"],
        },
        { elementId: "anchorWithTargetScriptSrcNone",
          propertySequence: ["href"],
          navigationFunction: "click",
        },
        { elementId: "anchorWithTargetOtherTabWithScriptSrcNone",
          propertySequence: ["href"],
          navigationFunction: "click",
        },
        { elementId: "areaWithTargetIframeWithScriptSrcNone",
          propertySequence: ["href"],
          navigationFunction: "click",
        },
        { elementId: "areaWithTargetOtherTabWithScriptSrcNone",
          propertySequence: ["href"],
          navigationFunction: "click",
        },
        { targetWindow: otherTabWithScriptSrcNone,
          propertySequence: ["location", "href"],
        },
      ];

      for (testCase of kTestCases) {
        const injectionSinkDescription = determineInjectionSinkDescription(testCase);

        promise_test(t => new Promise(resolve => {
          window.addEventListener("securitypolicyviolation", resolve,
            { once: true });

          window.addEventListener("message",
            t.unreached_func("Should not have received a message"),
            { once: true }
          );
          assignJavascriptURLToInjectionSink(testCase);
        }).then(e => {
          assert_equals(e.blockedURI, "inline");
          assert_equals(e.effectiveDirective, "script-src-elem");

          // Chrome and Firefox currently check the parent's CSP first, hence
          // asserting it below. A comparison with WebKit was impossible due to
          // https://github.com/web-platform-tests/wpt/issues/49262.
          // The behavior should be specified; see
          // https://github.com/whatwg/html/issues/4651#issuecomment-495060149 and
          // the encompassing ticket.
          assert_equals(e.originalPolicy, "script-src 'self' 'nonce-abc'",
              "Parent's policy is checked first");
        }), `Executing the javascript URL should violate the parent's CSP for
          ${injectionSinkDescription}`);
      }

      done();
    });
  });
</script>
</body>
</html>