File: to-javascript-url-script-src.html

package info (click to toggle)
firefox 143.0.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,617,328 kB
  • sloc: cpp: 7,478,492; javascript: 6,417,157; ansic: 3,720,058; python: 1,396,372; xml: 627,523; asm: 438,677; java: 186,156; sh: 63,477; makefile: 19,171; objc: 13,059; perl: 12,983; yacc: 4,583; cs: 3,846; pascal: 3,405; lex: 1,720; ruby: 1,003; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 53; csh: 10
file content (78 lines) | stat: -rw-r--r-- 2,775 bytes parent folder | download | duplicates (12)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
<!DOCTYPE html>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>

<meta http-equiv="Content-Security-Policy" content="script-src 'nonce-abc'">

<body>

<script nonce="abc">
  function assert_csp_event_for_element(test, element, resolve) {
    assert_equals(typeof SecurityPolicyViolationEvent, "function", "These tests require 'SecurityPolicyViolationEvent'.");
    document.addEventListener("securitypolicyviolation", test.step_func(e => {
      assert_equals(e.blockedURI, "inline");
      assert_equals(e.effectiveDirective, "script-src-elem");
      assert_equals(element.contentDocument.body.innerText, "", "Ensure that 'Fail' doesn't appear in the child document.");
      element.remove();
      resolve();
    }, { once: true }));
  }

  function navigate_to_javascript_onload(test, iframe) {
    iframe.addEventListener("load", test.step_func(e => {
      assert_equals(typeof SecurityPolicyViolationEvent, "function");
      iframe.contentDocument.addEventListener(
        "securitypolicyviolation",
        test.unreached_func("The CSP event should be fired in the embedding document, not in the embedee.")
      );

      iframe.src = "javascript:'Fail.'";
    }));
  }

  promise_test(t => {
    return new Promise(resolve => {
      var i = document.createElement("iframe");
      i.src = "javascript:'Fail.'";

      assert_csp_event_for_element(t, i, resolve);

      document.body.appendChild(i);
    })
  }, "<iframe src='javascript:'> blocked without 'unsafe-inline'.");

  promise_test(t => {
    return new Promise(resolve => {
      var i = document.createElement("iframe");

      assert_csp_event_for_element(t, i, resolve);
      navigate_to_javascript_onload(t, i);

      document.body.appendChild(i);
    })
  }, "<iframe> navigated to 'javascript:' blocked without 'unsafe-inline'.");

  promise_test(t => {
    return new Promise(resolve => {
      var i = document.createElement("iframe");
      i.src = "../support/echo-policy.py?policy=" + encodeURIComponent("script-src 'unsafe-inline'");

      assert_csp_event_for_element(t, i, resolve);
      navigate_to_javascript_onload(t, i);

      document.body.appendChild(i);
    })
  }, "<iframe src='...'> with 'unsafe-inline' navigated to 'javascript:' blocked in this document");

  promise_test(t => {
    return new Promise(resolve => {
      var i = document.createElement("iframe");
      i.src = "../support/echo-policy.py?policy=" + encodeURIComponent("script-src 'none'");

      assert_csp_event_for_element(t, i, resolve);
      navigate_to_javascript_onload(t, i);

      document.body.appendChild(i);
    })
  }, "<iframe src='...'> without 'unsafe-inline' navigated to 'javascript:' blocked in this document.");
</script>